tag:blogger.com,1999:blog-16194780523275038962024-03-08T11:33:34.178-08:00Professional Practices FaqsSumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-1619478052327503896.post-23982216587119958622008-08-11T23:33:00.002-07:002008-12-22T20:24:24.850-08:00Industrial Relations Economic context and Human Resources ManagementSources of Finance<br />Government policy in UK has over recent years, strongly encouraged the growth of small companies<br />As a result, there are many possible sources of funding or finance<br />However, they can all grouped under three headings: Grants, Loans & Sale of equity<br />Financial Structure of a organization<br />Coming soon<br />Grants<br />A grant is a sum of money given to the company; while the company is obliged (thankful) to demonstrate that it has been used for purposes for which it was intended, it is not intended that grant should ever be paid back to the organization which gave it.<br /><br />Surprisingly, grants are only available from government (local or national) and European Commission sources or, very occasionally, from charities.<br />Very often, grants are limited to a certain proportion of the money spent on a particular development and are conditional upon the reminder being raised from other sources.<br />Loans<br />A loan is a sum of money lent to the company; interest is payable on it, at a rate that may be fixed or variable, and the loan is usually for a fixed period.<br />The company is liable to pay back the loan, if the company goes into liquidation (bankruptcy); the lender is entitled to recover the loan from the sale of the assets of the company.<br /><br />In most cases security is required for the loan; that is the loan is associated with assets owned by the company in much the same way that a mortgage is associated with a house<br />Equity capital<br />Equity (justice, fairness) capital (assets) is money paid to the company in exchange for a share in the ownership of the company.<br />Shareholders are at a much greater risk of getting a poor return on their capital or even losing it completely than are lenders but, in compensation for this, they stand to make a greater profit than lenders if all goes well.<br />Read example on page-64 in text book<br />Human Resource Issues <br />Recruitment and Selection<br />It is Concern policy to ensure all aspects of the recruitment and selection process (i.e. job analysis, advertising, documentation, interviews, interview evaluation, medical examinations, job offers) promote equality, fairness and transparency at all times.<br />Recruitment<br />Concern aims to recruit staff that satisfies as far as possible the requirements of the job, as outlined in the staff requisition (apply for) form.<br />The main criteria for employment are the candidate’s ability to fulfill the role, relevant work experience, education and/or qualifications, other related skills and motivation as applicable to working with concern.<br />Selection<br />It is Concern policy to fill vacancies from within the organization whenever possible, however, Concern reserves the right to recruit externally to the organization.<br />In exceptional circumstances, concern also reserves the right to ‘head-hunt’ potential candidates if they are unable to recruit a suitably qualified candidate following the advertisement of the position.<br />Staff training and development<br />Concern Worldwide is fully committed to ensuring that all members of staff have the relevant knowledge, skills and expertise to perform their work to consistently high standards; and to achieve their full potential compatible with Concern’s policy.<br />Training and development of staff members is fundamental to ensure the effective provision and quality of its work within the communities where we work.<br />The organization is committed to allocating a percentage of its salary budget per annum to invest in training and development.<br />Job evaluation<br />An effective way of determining the relative value of each position within an organization. By rank-ordering jobs using a point system, you can then accurately assign salaries in a defensible manner.<br />The usual end result of job evaluation is a hierarchy of jobs or groups of jobs in the organization. The hierarchy is usually based on job content, or value, or a combination of both. Job content refers to the skills required and the degree of responsibilities assumed. The value of a job refers to its relative contribution to the organization's goals or to their external market rates. Focusing on job content improving employee understanding of job content and what is valued in their work. <br /> <br /><br />While not automatically determining the pay of a job, job evaluation provides a basis for establishing equitable pay differentials between jobs. In other words, it can help integrate pay with a job's relative contributions to the organization. <br />Job evaluation gives you a structured and consistent base from which to build your pay scale and/or a system of performance review and merit increases. If staff know where their jobs rank and where their salaries rank, you have a great base from which to allocate raises where you see fit. This is an excellent way to establish a workable, agreed-upon pay structure.<br /><br />Appraisal What is performance appraisal?<br />Performance appraisal.<br />A process of systematically evaluating performance and providing feedback upon which performance adjustments can be made.<br />Performance appraisal should be based on job analysis, job description, and job specifications.<br />What is performance appraisal?<br />Performance appraisal methods.<br />Comparative methods.<br />Seek to identify a person’s relative standing among those people being rated.<br />Absolute methods.<br />Specify precise measurement standards.<br />What is performance appraisal?<br />Comparative methods of performance appraisal.<br />Ranking.<br />Paired comparison.<br />Forced distribution.<br />What is performance appraisal?<br />Ranking.<br />Consists of rank ordering individuals from best to worst on each performance dimension.<br />Relatively simple to use.<br />Can be burdensome when evaluating a large number of people.<br />What is performance appraisal?<br />Paired comparison.<br />Each person is directly compared with every other person being rated.<br />Final performance ranking reflects the frequency of endorsement across all pairs.<br />Can be very tedious when many people must be compared.<br />What is performance appraisal?<br />Forced distribution.<br />Uses a small number of performance categories, and rater assigns a specific proportion of employees to each category.<br />Can be problematic if most of the employees perform similarly.<br />What is performance appraisal?<br />Absolute methods of performance appraisal.<br />Graphic rating scales.<br />Critical incident diary.<br />Behaviorally anchored rating scales.<br />Management by objectives (MBO).<br />What is performance appraisal?<br />Graphic rating scales.<br />List of dimensions related to high performance, and the rater assigns an individual score on each dimension.<br />Easy and efficient to use.<br />What is performance appraisal?<br />Critical incident diary.<br />Record of incidents of each subordinate’s behavior that led to unusual success or failure in a give performance aspect.<br />Behaviorally anchored rating scales (BARS).<br />Developed through the careful collection of observable job behaviors that describe both superior and inferior performance.<br />A rating scale is developed that anchors specific critical behaviors, each of which reflects a different degree of performance effectiveness.<br /><br />What is performance appraisal?<br />Management by objectives (MBO).<br />Subordinates work with their supervisor to establish specific task-related objectives.<br />MBO is the most individualized appraisal method .<br />MBO works well with counseling, provided the goals focus on important activities.<br /><br />Remuneration policies<br />It is Concern policy to ensure that remuneration (salary) packages are internally equitable, (fair) within the context of the jurisdiction that the appointment is being made and externally competitive with like organizations.<br />Remuneration packages will be applied consistently throughout the organization and will be fair, adequate (sufficient).<br />Salaries are reviewed on an annual basis in light of cost of living increases.<br />Concern salaries scales will be observed/reviewed on an ongoing basis to ensure competitiveness with like organizations.<br /><br /><br />Any proposed salary changes in light of cost of living in each country of operation should have the approval of the Regional Director, in consultation with the Human Resources Director, prior to any changes being implemented.<br />When salary reviews take place, staff will be informed of<br />what the review is based on<br />who is responsible for conducting it<br />and who will make the final decision on whether any increase will be rewarded.<br />Procedures and review mechanisms for assessing/reviewing remuneration packages will be drawn up and made known to staff.<br />Dismissal and Grievances<br />Dismissal is a serious matter and a course of action that is not entered into lightly. The principles of natural justice must be followed in all cases of disciplinary action.<br />Disciplinary procedures should not commence without prior reference to the relevant Human Resource Directorate and relevant line manager. Advice will then be given on the procedures to be followed.<br /><br /><br />However, immediate dismissal may occur in certain circumstances i.e. in cases of gross misconduct/gross incompetence (unpleasant misbehavior/lack of skill) .<br />Gross misconduct/incompetence is any action, which is serious enough to be interpreted as a fundamental breach (violation) of the Contract of Employment.<br />Dismissal may be with or without notice depending on the circumstances.<br />The following examples of gross misconduct/incompetence<br />Theft, fraud.<br />Use of violence<br />Being at work under the influence of alcohol or drugs.<br />Misuse of Concern’s systems, including the viewing/ transmission of the following materials:<br /> -Defamatory (insulting).<br /> -Pornographic, Offensive (nasty), Harassing (Irritating)<br /><br />Grievances<br />Concern recognizes that there is no real substitute for a good day-to-day manager/employee relationship for resolving work-related problems.<br />Nevertheless, if this relationship fails to resolve a grievance informally, there is a formal process called the Grievance Procedure, where employees have a right to bring any grievances (complaint, criticism) to the attention of management and expect a response within working days.<br /><br />Formal grievance procedures, which comply with local employment legislation and Concern best practice standards, are outlined in each country Human Resource Procedures Manual.<br />All staff should have access to and be aware with the grievance procedures, from commencement of employment.<br />Contracts of employment<br />National Staff are staff employed by Concern in each country of operation.<br />The terms and conditions of employment for national staff are based on local legislation and should also comply with Concern’s best practice standards.<br />While contracts of employment may vary from country to country in order to comply with the national legislation (lawmaking) under which they are governed<br /><br />Full name and address of both the relevant Concern office and the employee<br />The place of work<br />Job title<br />The date of joining<br />Any terms or conditions relating to hours of work, paid leave & pension schemes and retirement plans etc <br /><br />Employee is also required to comply (obey) with Concern policies and procedures as outlined in relevant documentation i.e. Human Resource Policy Document, Human Resource Procedures Manual and Health and Safety Statement.<br />Types of Contracts<br />Fulltime Contracts<br />Fixed Term/Temporary Contracts<br />Part-time Contracts <br />Discrimination<br />Discrimination means treating some people less<br /> favorably than others on the grounds of<br /> personal traits, like<br />Gender<br />Race, color, nationality<br />Disability<br />Sexual orientation<br />Religion<br />Age<br /><br />Discrimination and The Law <br />The law in Europe, the USA, and other countries<br /> prohibits discrimination.<br /><br />What does this mean for IT professionals?<br /><br />Much of the legislation concerns the<br /> workplace. People in managerial and<br /> supervisory positions (i.e. most professionals,<br /> sooner or later), must be fully aware of the<br /> legal obligations (pressure).<br />Some of the legislation has implications (inference) for how information systems are built.<br /><br />Anti-discriminatory laws related to Disability<br /><br />1995: The Disability Discrimination Act<br />2001: Special Educational Needs and<br /> Disability Act<br /><br /><br />What does the law say?<br />Illegal to treat disabled employees or<br /> applicants less favorably because of their<br /> disability without substantial (considerable) justification.<br />Employer required to make reasonable<br /> adjustments to accommodate a disabled<br /> employee or applicant.<br />Illegal for businesses and organizations<br /> providing goods and services to treat<br /> disabled people less favorably.<br /><br />Discrimination on the grounds of sex, race, religion<br />1975: Sex Discrimination Act<br />1976: Race Relations Act<br /><br /><br /><br />Direct discrimination occurs where a person is treated less favorably than another person (sex or gender) is, has been, or would be, treated on any of the said six grounds out.<br />Indirect discrimination occurs where a provision (whether in the nature of a requirement, practice or otherwise) which relates to the employment of a person is not explicitly discriminatory but nevertheless impacts negatively on a<br /> particular group.<br /><br /><br />It unlawful to discriminate on the grounds of sex, race or religion.<br />Discrimination is not allowed in employment, education, advertising or when providing housing, goods, services and facilities.Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-27645505854582147742008-08-11T23:33:00.001-07:002008-12-22T20:24:24.850-08:00Codes of EthicsBackground (Relationship between Code of Ethics and Professional Conduct)<br />The term professional code of conduct and code of ethics both are used.<br />The code of ethics is seen as being more aspirational and less regulatory than a professional code of conduct.<br />Both professional code of conduct and code of ethics is distinct from code of practice, which is concerned with good practice in doing the job.<br /><br />Ethical code of conduct<br />It is not possible to develop a detailed set of rules, policies or procedures that cover all circumstances. The best guidelines are individual integrity, common sense and compliance with law.<br />The code of ethics provides a basic guide to assist our management, employees and others acting on our behalf in understanding their responsibilities. <br />Code applies to each of our directors, officers, employees and other representatives.<br /><br /><br />Individuals should have legal and ethical behavior is one of our most valuable assets. We are responsible for safeguarding this important assets.<br />Company should have a policy of strict compliance with all laws, whether federal, state, local or foreign. The highest standards of moral and ethical behavior are essential to maintaining a good reputation. We do not tolerate unethical or dishonest conduct.<br /><br />Professional codes of conduct: are particularly valuable in addressing conduct which can be seen as an abuse of the professional status.<br />For e.g. Doctors can be struck off, that is deprived of their registration, for entering into sexual relationships with their patients or for drug taking.<br /><br />Professional codes of conduct are, by their very nature, collectivist and rule-based. Nevertheless, rule-based ethical systems always seem too rigid and restricted to handle complicated situations on their own and they are incapable of handling situations in which rules conflict or several different actions are possible but all in some way violate the rules.<br />Codes of Conduct of Professional Bodies<br />Australian Computer Society, Code of Ethics and Professional Conduct. (ACS)<br />British Computer Society Code of Conduct. (BCS)<br />Institute of Electrical & Electronic Engineering Code of Ethics (IEEE).<br />British Computer Society (BCS) <br /> The BCS vision and mission statements<br />Vision Statement (Long-term aim of BCS)<br />Our vision is to see the IT profession recognized as being a profession of the highest integrity and competence.<br />Mission Statement (Core purpose of BCS)<br />BCS will lead the development and implementation of standards for the IT profession through innovative and valued products and services and by being the respected voice informing and influencing individuals, organizations and society as a whole.<br /><br />BCS will lead the change in the standing of the IT profession by creating an understanding of what is required to implement successful IT projects and programmes, and to advise, inform and persuade industry and government on what is required to produce successful IT enabled projects.<br /><br />BCS Values <br /> Focus on serving the profession<br />Providing superior quality service that meets the individual needs<br />Developing and delivering valued products and services that makes a difference to people worldwide<br /> Recognition and Concern for People<br />Respecting the individual<br />Advocating fair treatment<br />Rewarding exceptional performance<br />Showing commitment to personal and professional growth<br />Encouraging teamwork<br /><br /><br /> Maintain High Ethical Standards<br />Treating customers and suppliers with integrity, fairness and respect<br />Avoiding even the appearance of conflict of interest<br />Providing leadership in industry, government and trade and regulatory associations<br /> Innovative and Results-oriented<br />Dedicating ourselves to maximising the value of the organization for stakeholders<br />Encourage creativity<br /><br />ACS Code of Conduct<br />The Australian Computer Society (ACS) is the recognized association for Information & Communications Technology (ICT) professionals, attracting a large and active membership from all levels of the ICT industry.<br />The society was founded in 1966.<br />ACS members work in all areas of business and industry, government and academia, and are qualified and experienced ICT professionals<br /><br />Mission and Objective<br /> Mission<br />To advance professional excellence in information technology.<br /> Principal Objective<br />To promote the development of Australian information and communications technology resources.<br /><br />Secondary Objective<br />To advance professional excellence in information and communications technology.<br />To further the study, science and application of information and communications technology.<br />To promote, develop and monitor competence in the practice of information and communications technology by persons and organizations.<br />To define and promote the maintenance of standards of knowledge of information and communications technology for members.<br />To promote the formulation of effective policies on information and communications technology.<br />To extend the knowledge and understanding of information and communications technology in the community.<br />To maintain and promote the observance of a code of ethics for members of the Society.<br />IEEE Code of Conduct<br />We, the members of the IEEE, in recognition of the importance of our technologies in affecting the quality of life throughout the world, and in accepting a personal obligation to our profession, its members and the communities we serve, do hereby commit ourselves to the highest ethical and professional conduct and agree: <br />1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that might endanger the public or the environment; <br />2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties when they do exist; <br />3. to be honest and realistic in stating claims or estimates based on available data; <br />4. to reject bribery in all its forms; <br />5. to improve the understanding of technology, its appropriate application, and potential consequences;<br /><br /><br />to maintain and improve our technical competence and to undertake technological tasks for others only if qualified by training or experience, or after full disclosure of pertinent limitations; <br />7. to seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to credit properly the contributions of others; <br />8. to treat fairly all persons regardless of such factors as race, religion, gender, disability, age, or national origin; <br />9. to avoid injuring others, their property, reputation, or employment by false or malicious action; <br />10. to assist colleagues and co-workers in their professional development and to support them in following this code of ethics.<br /><br />Public interest and Social implications<br />Health and safety issues<br />Health and safety at work usually only hits the headlines when there is a major disaster. Unfortunately, in recent years there has been an unprecedented number of these.<br />we can still recall the horror of Zeebruggeferry disaster and Paddington rail crash etc. although all of these involved the activities of people at work, one circumstance that made them particularly news-worthy was that, with exception of Piper Alpha, the majority of people who suffered as a consequence of the incidents were members of the public.<br /><br />Number of fatal accidents at work has fallen sharply since the beginning of the 1970’s but around 200 employees each year still die as a result of accidents at work and significant number of members of the public lose their lives as a result of work activities.<br />There is nothing like an accident for motivating people to adopt safe working practices. The problem lies in changing attitudes before disasters occurs and in creating a safe working environment, or at least one that is as safe as is possible.<br /><br /><br /><br />The best way of achieving this is by building in safety from the start in plant design, factory layout, training and so on, but so often this is compromised by other considerations which may seem to be more important in the short-term, such as pressure of time or financial concerns.<br />This has obvious implications for the design of the control software that is now everywhere. In many high-risk areas, such as the oil, chemical and nuclear industries, the safety systems themselves are often computer controlled; the software must be of the highest integrity and must handle safety all foreseeable (predictable) eventualities (possibilities).<br /><br />Similar considerations apply to other applications such as “fly-by-wire” aircraft where proper control is wholly dependent on the correct and safe operation of the aircraft’s computer systems.<br /><br />To summarize, the main recommendations of the Robens (chairman) Committee on Safety and Health at work (1972) were:<br />Safety and health objectives should be clearly defined at all levels within firms.<br />Workers should be more involved in safety and health at their workplace.<br />There should be a legal duty on employers to consult their employees on safety and health matters necessary at their workplace.<br />A National Authority for safety and health should be established.<br />Existing statutory (legal) provisions (terms) should be replaced by provisions under a new enabling Act.<br /><br /><br />Voluntary (intentional) codes of practice should be introduced.<br />The scope of the legislation should be extended to include all employees (with minor exceptions) and the self-employed (temporary).<br />The existing safety and health inspectorates should be amalgamated (merged).<br />New administrative sanctions should be adopted.<br />Local authority work should be coordinated with that of the new authority.<br />The interests of the public should be taken into account in the new legislation.<br />The Employment Medical Advisory Service should function as part of the new authority.<br /><br />The Health and Safety at Work etc. Act 1974 <br />General Terms<br />Section 2(1): 'It shall be the duty of every employer to ensure, so far as is reasonably possible, the health, safety and welfare at work of all his employees'.<br />Section 3 of the Act requires both employers and the self-employed (temporary) to ensure that persons not in their employment (i.e. the general public) are not thereby exposed to risks to their health and safety.<br />Section 4 of the Act places a similar duty on persons in control of premises.<br /><br />Section 7 places duties on employees. These duties are to take reasonable care for the health and safety of themselves and of others who might be affected, and also to co-operate with the employer in complying with the relevant statutory provisions (legal terms).<br />Section 8 contains a global requirement that no person, whether employee or not, adult or child, should deliberately interfere with anything provided to ensure health and safety.<br />Environmental protection<br />Environmental Law<br />1990: Environmental Protection Act<br />Environmental law is a body of law, which is a system of complex and interlocking statutes, common law, treaties, conventions, regulations and policies which seek to protect the natural environment which may be affected, impacted or endangered by human activities. Some environmental laws regulate the quantity and nature of impacts of human activities: for example, setting allowable levels of pollution. Other environmental laws are preventive in nature and seek to assess the possible impacts before the human activities can occur.<br /><br /><br />In this Act,<br /> “adverse effect” means one or more of,<br /> (a) impairment of the quality of the natural environment for any use that can be made of it,<br /> (b) injury or damage to property or to plant or animal life,<br /> (c) harm or material discomfort to any person,<br /> (d) an adverse effect on the health of any person,<br /> (e) impairment of the safety of any person,<br /> (f) rendering any property or plant or animal life unfit for human use,<br /> (g) loss of enjoyment of normal use of property, and<br /> (h) interference with the normal conduct of business; (“consequence préjudiciable”)<br />For further read that Act from internetSumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-14070218624529503192008-08-11T23:32:00.001-07:002008-12-22T20:24:24.850-08:00Ethics and Codes of Professional ConductThe need for professional ethics<br />What is a Profession<br />A profession is an occupation that requires extensive training and the study and mastery of specialized knowledge, and usually has a professional association, ethical code and process of certification or licensing.<br />Examples are: librarianship, accounting, law, teaching, architecture, medicine, finance, the military and engineering.<br />What are Professional Ethics?<br />Professional ethics are a code of conduct that govern how members of a profession deal with each other and with third parties.<br />Need of Professional Code of Ethics or for professional ethics<br />A Professional Code of Ethics serves several functions:<br />Symbolizes (represents) the professionalism of the group.<br />Defines and promotes a standard for external relations with clients and employers.<br />Protects the group’s interests.<br />Codifies members’ rights.<br />Expresses ideals to aspire to.<br />Professional or Profession Characteristics and Responsibilities<br />Engineers are expected to possess a given level of knowledge and skills in an engineering specialty that exceed those of the general public.<br />Engineers must have a sense of responsibility and service to society, employers and clients.<br />Engineers are expected to follow established codes of ethics for their profession and to guard their professional integrity and ideals and those of their profession.<br />Honesty & Integrity<br /> Honesty<br />I must not knowingly mislead a client or potential client as to the suitability of a product or service.<br />I must not misrepresent my skills or knowledge.<br />I must give opinions which are as far as possible unbiased (neutral, fair) and objective.<br />I must give realistic estimates for projects under my control.<br />I must qualify professional opinions which I know are based on limited knowledge or experience.<br />I must give credit for work done by others where credit is due (unpaid).<br /><br /> Integrity<br />Do not breach (violate) public trust in the profession or the specific trust of your clients and employers.<br />Observance (performance) of utmost (extreme, maximum) honesty and integrity must underlie (lie behind) all your professional decisions and actions. Circumstances will undoubtedly arise during the course of your professional career where it may appear to be beneficial for you to deceive your client in some way. The resultant short term gain from this type of behavior is not acceptable professional practice, nor is it worth eroding (wear away) the confidence and trust that is built up over the longer term.<br />Professional development<br />I must increase my awareness of issues affecting the information technology profession and its relationship with the community.<br />I must encourage my colleagues, employees and students to continue their own professional development.<br />Maintain and develop their professional competence (capability).<br />Participate in and contribute to continuing education and their own and colleagues' professional and scientific growth.<br /><br /><br />Keep themselves up to date with relevant knowledge, skills, research methods, and techniques, through the reading of relevant literature, peer consultations, and continuing education activities, in order that their service or research activities and conclusions shall benefit and not harm others.<br />Perform their teaching duties on the basis of careful preparation, so that their instruction shall be current and scholarly.<br /><br />THE RULES FOR PROFESSIONAL CONDUCT (Professional skills comply with law)<br />All members shall discharge their professional duties with integrity and shall not undertake work that they are not competent to do.<br />All members shall have full regard for the public interest, particularly in relation to matters of health and safety, and in relation to the well-being of future generations.<br />All members shall show due regard for the environment and for the sustainable management of natural resources.<br /><br />All members shall update and broaden their professional knowledge and skills on a continuing basis and shall give all reasonable assistance to further the education, training and continuing professional development of other members and prospective members of the profession.<br />All members shall notify the Institute if convicted of a criminal offence or upon becoming bankrupt or disqualified as a Company Director.<br />Contribute towards advancement of human welfare<br /><br />Public interest & Public awareness<br />Members shall in their professional practice safeguard public health and safety and have regard to protection of the environment.<br />Members shall have due regard to the legitimate rights of third parties.<br />Members shall ensure that within their chosen fields they have knowledge and understanding of relevant legislation, regulations and standards and those they comply with such requirements.<br /><br /><br />Members shall in their professional practice have regard to basic human rights and shall avoid any actions that adversely affect such rights.<br />You shall reject any offer of bribery or inducement.Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-7333429512596012222008-08-11T23:31:00.000-07:002008-12-22T20:24:24.850-08:00Computer Misuse:Hacking<br />Hacking, unauthorized access<br />Types of Computer Crime<br />Introduction of Viruses<br />Fraud and types of Computer Fraud<br />Cyber crime<br />What Is Hacking?<br />The act of forfeiting individual freedom of action or professional integrity in exchange for wages or other assured reward<br />At first, “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do<br />Reasons For Hacking <br />Theft of services: The first reason is theft of service, if a system offers some type of service and a hacker has a use for it, they will hack the system. Examples of such systems are on-line information networks (CompuServe, AOL etc)<br /><br /><br />Take valuable files: The second reason a hacker may hack into a system is to take valuable files, e.G., Credit card numbers, or info on operation of telecommunication systems<br /><br />Vengeance and hate: another reason for hacking is vengeance and hatred<br />E.g. Hacker pillaged US files to sell secrets Saddam <br />Thrill and excitement: The fourth reason hackers break into systems is for the thrill and excitement of being somewhere you are not authorized to be<br /> <br /><br />The final reason why hackers do what they do is just for knowledge and experiment. Hackers learn a great deal every time they break into a new type of system<br />Talking the Talk<br />Hackers have their own lingo and style of writing<br />Hacker lingo is so pervasive, there’s even the new hacker’s dictionary, recently published in its third edition<br />Attacks on the Increase<br />A study released this spring by the computer security institute and the FBI's international crime squad found that nearly two-thirds of more than 500 organizations reported a computer security breach (violation) within the past year, up from 48 percent a year ago and 22 percent the year before that<br /><br />Many hacker attacks go unreported because companies want to avoid negative publicity<br />Other companies stung by hackers feel compelled to tell what happened <br />What’s Being Done?<br />While the internet has revolutionized (uprising) business and communication almost overnight, laws regulating its use and misuse haven't developed as swiftly<br />But in the last few years congress and the courts have started responding to the threat posed by computer crime<br /><br />There are laws in the federal statutes (act, law) that have been applied to hacker cases. These laws aren't designed specifically to counter computer crime, but have been applied to certain cases when existing law has proved inadequate in scope:<br /><br />How to Be Vigilant<br />Get a copy of your credit report<br />Shred (cut up) all your information that you have offline<br />Confidential information should be encrypted <br /><br /><br /><br />Another thing you should do is make sure that you don't give confidential information by cell phone, or by a remote phone, or on the internet unless it's encrypted<br /><br /><br /><br />And finally, you should put up firewalls so someone can't come in and steal your information from your computer <br />Unauthorized Access<br /><br />Eavesdropping on a computer;<br />Listening to a specific port, snooping the IP etc<br />Making unauthorized use of computers for personal benefit;<br />use of company computer for private work<br />Unauthorized alteration or destruction of information stored on a computer;<br />Criminal damage<br />Intentionally or recklessly destroys or damages property belonging to another without lawful excuse.<br />Section 3 of the Computer Misuse Act 1990<br />1) A person is guilty of an offence if: a) he does any act which causes unauthorized modification of the contents of a computer; and b) at the time when he does the act he has the requisite intent and the requisite knowledge.<br />Denying access to an authorized user;<br />The unauthorized removal of information stored on a computer.<br /><br /><br /><br />U.S. Computer Fraud and Abuse Act<br />Unauthorized access to a computer containing data protected for the national defense or foreign relations concerns<br />Unauthorized access to a computer containing certain banking or financial information<br />Unauthorized access, use, modification, destruction, or disclosure of a computer or information in a computer operated on behalf of the U.S. government<br />Accessing without permission a “protected computer,” which the courts now interpret to include any computer connected to the Internet<br /><br />Computer fraud<br />Transmitting code that causes damage to a computer system or network<br />Trafficking in computer passwords<br />Computer Crime<br />The vast, interconnected information systems of today are a relatively open territory of crime where the modern computer criminal seems to remain one step ahead of the law enforcing officials.<br />Crimes are committed by people that have:<br />Knowledge to gain access to a computer system<br />Knowledge to manipulate the system to produce the desired result<br />Generally, the computer is used :<br />As tool to commit crime<br />As the object of Crime<br />Computers as Tools to Commit Crime<br />Credit card fraud, by illegally gaining access to back accounts (or credit cards)<br />Making illegal financial transactions like fraudulent payments<br />Counterfeiting money, bank checks, stock and bond certificates using high-quality printers<br />Computers as Objects of Crime<br />Illegal access and use of the organization's computer based information systems by a criminal hacker<br />Data alteration and destruction many times caused by a virus (application or system virus), a worm, a logic bomb or a Trojan horse<br />Data and information theft by those that illegally access the system (usually insiders)<br />Equipment theft<br />Software piracy by illegally duplicating software (patrolled by the Software Publishers Association)<br />Computer-related scams or cheats especially over the Internet<br />International computer crime especially crime related to obtaining computer hardware, related technology and trade secrets<br />Table 1.0: Common Methods Used to Commit Computer Crimes<br />(continued)<br />Types of Computer Crime<br />Any crime in which computer-related technology is encountered.<br />The commission of illegal acts through the use of a computer or against a computer system.<br /><br />Types of Computer Crime<br /><br />Business attacks<br />Financial attacks<br />Terrorist attacks<br />Grudge attacks<br />Fun attacks<br /><br />Business attacks<br />Unauthorized access or hack the business documents and reports of a company for any valid reason.<br />Financial attacks<br />Unauthorized access or hack the financial or account related documents and reports of a company for any valid reason.<br />Terrorist attacks<br />Unauthorized access or hack the any important records, data or computer of a company for the purpose of destruction only.<br /><br /><br />Grudge attacks<br />Unauthorized access or hack the any important records, data or computer of a company for the feeling of dislike or revenge.<br />Fun attacks<br />Unauthorized access or hack the any important records, data or computer of a company for the feeling of fun.<br />Computer Virus and its types<br />Virus: a program that attaches itself to other programs<br />Worm: an independent program that replicates its own program files until it interrupts the operation of networks and computer systems<br />Malware: software that is harmful or destructive, such as viruses and worms<br />(continued)<br />Trojan horse: a program that appears to be useful but actually masks a destructive program<br />Logic bomb: an application or system virus designed to “explode” or execute at a specified time and date<br />Variant: a modified version of a virus that is produced by the virus’s author or another person who amends the original virus code<br />What is Fraud? Five Conditions of Fraud<br />False representation - false statement or disclosure<br />Material fact - a fact must be substantial (important) in inducing (bring to mind) someone to act<br />Intent to deceive must exist<br />The misrepresentation must have resulted in justifiable reliance (dependence) upon information, which caused someone to act<br />The misrepresentation must have caused injury or loss<br />2002 Study of Fraud<br />Why Fraud Occurs<br />Employee Fraud<br />Committed by non-management personnel<br />Usually consists of: an employee taking cash or other assets for personal gain by circumventing a company’s system of internal controls<br />Management Fraud<br />It is perpetrated (committed) at levels of management above the one to which internal control structure relates.<br />It frequently involves using the financial statements to create an illusion that an entity is more healthy and prosperous than it actually is.<br />If it involves misappropriation (fraud) of assets, it frequently is shrouded (masked) in a maze of complex business transactions.<br />Fraud Schemes<br />Three categories of fraud schemes according to the Association of Certified Fraud Examiners:<br />A. fraudulent statements<br />B. corruption<br />C. asset misappropriation<br />A. Fraudulent Statements<br />Misstating the financial statements to make the copy appear better than it is<br />Usually occurs as management fraud<br />May be tied to focus on short-term financial measures for success<br />May also be related to management bonus packages being tied to financial statements<br />B. Corruption<br />Examples:<br />Bribery or Corruption<br />illegal gratuities<br />conflicts of interest<br />economic extortion<br /><br />C. Asset Misappropriation<br />Most common type of fraud and often occurs as employee fraud.<br />Examples:<br />making charges to expense accounts to cover theft of asset (especially cash)<br />lapping: using customer’s check from one account to cover theft from a different account<br />transaction fraud: deleting, altering, or adding false transactions to steal assets<br />Computer Fraud<br />Theft, misuse, or misappropriation of assets by altering computer data<br />Theft, misuse, or misappropriation of assets by altering software programming<br />Theft or illegal use of computer data/information<br />Theft, corruption, illegal copying or destruction of software or hardware<br />Theft, misuse, or misappropriation of computer hardware<br />Data Collection Fraud<br />This phase of the system is most vulnerable because it is very easy to change data as it is being entered into the system. Also called input fraud (unauthorized alteration of data before it is entered, either directly or by giving incorrect information to an innocent dupe).<br />Also, GIGO (garbage in, garbage out) reminds us that if the input data is inaccurate, processing will result in inaccurate output.<br />Data Processing Fraud<br />Program Frauds<br />altering programs to allow illegal access to and/or manipulation of data files<br />destroying programs with a virus<br />Operations Frauds<br />misuse of company computer resources, such as using the computer for personal business<br />Database Management Fraud<br />Altering, deleting, corrupting, destroying, or stealing an organization’s data<br /> also called processing fraud<br />writing or altering the program to divert money (e.g. salami slicing)<br /><br />Oftentimes conducted by disgruntled or ex-employee<br />Information Generation Fraud<br />Stealing, misdirecting, or misusing computer output<br />Also called output fraud<br />destroying, hiding or altering computer output (e.g. printed reports)<br />Scavenging<br />searching through the trash cans on the computer center for discarded output (the output should be shredded, but frequently is not)<br />Cyber crime<br />Types of Cyber crime:<br />Unauthorized access by insiders (such as employees)<br />System penetration by outsiders (such as hackers)<br />Theft of proprietary information (whether a simple user ID and password or a trade secret worth millions of dollars)<br />Financial fraud using computers<br />Sabotage of data or networks<br />Disruption of network traffic (e.g., denial of service attacks)<br /><br />(continued)<br />Creation and distribution of computer viruses<br />Software piracy <br />Identity theft<br />Hardware theft (e.g., laptop theft).<br />Terrorists that target critical infrastructures, such as the PSTN, and the air traffic control system.<br /><br />CSI/FBI Computer Crime and Security Survey Results Revealed:<br />Organizations are under cyberattack from both inside and outside their electronic perimeters.<br />A wide range of cyberattacks have been declared.<br />Cyberattacks can result in serious financial losses.<br />Defending successfully against such attacks requires more than just the use of information security technologies.<br />CYBERCRIME 2000<br />Types of Cyberattacks, by percentage (source- FBI)<br />Financial fraud: 11%<br />Sabotage (damage) of data/networks: 17%<br />Theft of proprietary information: 20%<br />System penetration from the outside: 25%<br />Denial of service: 27%<br />Unauthorized access by insiders: 71%<br />Employee abuse of internet privileges 79%<br />Viruses: 85%<br />Top Cyber Crimes that Attack Business<br />Spam<br />Viruses/Worms<br />Industrial Espionage and Hackers<br />Wi-Fi High Jacking<br /><br />Spam<br />“Spam accounts for 9 out of every 10 emails in the United States.”<br />MessageLabs, Inc., an email management and security company based in New York.<br /><br />“We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” <br /> www.hormel.com<br /><br /><br />Can-Spam Act of 2003<br />Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam)<br />Signed into law by President Bush on Dec 16, 2003<br />Took effect Jan 1, 2004<br /><br />Unsolicited commercial email must:<br />Be labeled<br />Include Opt-Out instructions<br />No false headers<br /><br />www.spamlaws.com –lists all the latest in federal, state, and international laws<br />Spam is Hostile<br />You pay for Spam, not Spammers<br />Email costs are paid by email recipients<br />Spam can be dangerous<br />Never click on the opt-out link!<br />May take you to hostile web site where mouse-over downloads an .exe<br />Tells spammers they found a working address<br />They won’t take you off the list anyway<br />What should you do?<br />Filter it out whenever possible<br />Keep filters up to date<br />If you get it, just delete the email<br />Viruses and Worms<br />Viruses<br />software that piggybacks (attach, associate, take credit) on other software and runs when you run something else<br />Macro in excel, word<br />Transmitted through sharing programs on bulletin boards<br />Passing around floppy disks<br />An .exe, .com file in your email<br />Worms<br />software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written<br />Hackers are Everywhere<br /><br />Stealing data<br />Industrial Espionage (spying)<br />Identity theft<br />Deleting data for fun<br />A lot of bored 16 year olds late at night<br />Turning computers into zombies<br />To commit crimes<br />Take down networks<br />Distribute porn<br />Harass (Irritate) someone<br />Ethical/white hat hackers exist too<br />Help break into networks to prevent crimes<br />Wireless Fidelity (Wi-Fi)<br />Using antennas to create “hot spots”<br />Hotspots – Internet Access (sometimes free)<br />Newport Harbor - All the boats in Harbor have internet access<br />San Francisco Giants Stadium – Surf the web while catching a game<br /><br />Wi-Fi High Jacking<br />60-70% wireless networks are wide open<br /><br />Why are the Wi-Fi networks unprotected?<br />Most people say “Our data is boring”<br />But… criminals look for wireless networks to commit their crimes<br />And… the authorities will come knocking on your door…..<br /><br /><br /><br />Protect your Computers!<br />Use anti-virus software and firewalls - keep them up to date<br /><br />Keep your operating system up to date with critical security updates and patches<br /><br />Don't open emails or attachments from unknown sources<br /><br />Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist<br /><br />Back-up your computer data on disks or CDs often<br /><br />Don't share access to your computers with strangers<br /><br />If you have a wi-fi network, password protect it<br /><br />Disconnect from the Internet when not in use<br /><br />Reevaluate your security on a regular basis<br /><br />Make sure your employees and family members know this info too!Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-52001425793940827772008-08-11T23:30:00.000-07:002008-12-22T20:24:24.850-08:00Software engineeringThe economies of ALL developed nations are dependent on software<br />More and more systems are software controlled<br />Software engineering is concerned with theories, methods and tools for professional software development<br />Software costs<br />Software costs often dominate system costs. The costs of software on a PC are often greater than the hardware cost<br />Software costs more to maintain than it does to develop. For systems with a long life, maintenance costs may be several times development costs<br />Software engineering is concerned with cost-effective software development<br />What is software?<br />Computer programs and associated documentation (plus configuration data and user training)<br /><br />Software products may be developed for a particular customer or developed for a general market<br />Generic (shrink-wrapped) - developed to be sold to a range of different customers<br />Bespoke (custom) - developed for a single customer according to their specification<br />What are the attributes of good software?<br />The software should deliver the required functionality and performance to the user and should be maintainable, dependable and usable<br />Maintainability<br />Software must evolve to meet changing needs<br />Dependability<br />Software must be trustworthy<br />Efficiency<br />Software should not make wasteful use of system resources<br />Usability<br />Software must be usable by the users for which it was designed<br />...attributes of good software<br />(these two are not always required)<br />Robustness<br />Software should fail only under extreme conditions<br />Portability<br />Should be possible to move from one environment to another<br /><br /><br />The software crisis<br />Advances in hardware technologies made it possible to build powerful computers<br />This allowed building of more complex and powerful software<br />Existing software development methodologies were not capable of handling such large projects.<br />Hence projects had many problems:<br />Over budget<br />Late delivery<br />Requirements not met<br />Poor usability<br /><br />What is software engineering?<br />Software engineering is an engineering discipline which is concerned with all aspects of software production (Sommerville, 2001)<br />Software engineers should adopt a systematic and organised approach to their work and use appropriate tools and techniques depending on the problem to be solved, the development constraints and the resources available<br />What is the difference between software engineering and system engineering?<br />System engineering is concerned with all aspects of computer-based systems development including hardware, software and process engineering. Software engineering is part of this process<br />System engineers are involved in system specification, architectural design, integration and deployment<br />Why does a software engineer need to understand system engineering aspects?<br />Many software systems are part of a larger system<br />System engineering decisions have direct impacts on software<br />Many systems now have lots of software parts<br />What is a software process?<br />A set of activities and associated results whose goal is the development or evolution of a software product<br />Generic (general) activities in all software processes are:<br />Specification - what the system should do and its development constraints<br />Development - production of the software system<br />Validation - checking that the software is what the customer wants<br />Evolution - changing the software in response to changing demands<br />What are software engineering methods?<br />Structured approaches to software development which include system models, notations, rules, design advice and process guidance<br />Model descriptions <br />Descriptions of graphical models which should be produced<br />Rules<br />Constraints applied to system models<br />Recommendations<br />Advice on good design practice<br />Process guidance<br />What activities to follow<br />What is CASE ? (Computer-Aided Software Engineering)<br />Software systems which are intended to provide automated support for software process activities. CASE systems are often used for method support<br />Upper-CASE<br />Tools to support the early process activities of requirements and design<br />Lower-CASE<br />Tools to support later activities such as programming, debugging and testing<br />What are the costs of software engineering?<br />Roughly 60% of costs are development costs, 40% are testing costs. For custom software, evolution costs often exceed development costs<br />Costs vary depending on<br />the type of system being developed and<br />the requirements of system attributes such as performance and system reliability<br />Distribution of costs depends on the development model that is used<br />What are the key challenges facing software engineering?<br />Coping with legacy (old) systems, coping with increasing diversity (variety) and coping with demands for reduced delivery times<br />Legacy systems<br />Old, valuable systems must be maintained and updated<br />Heterogeneity<br />Systems are distributed and include a mix of hardware and software<br />Delivery<br />There is increasing pressure for faster delivery of software<br />Professional and ethical responsibility<br />Software engineering involves wider responsibilities than simply the application of technical skills.<br />Software engineers must behave in an honest and ethically (morel, principled) responsible way if they are to be respected as professionals.<br />Issues of professional responsibility<br />Confidentiality<br />Engineers should normally respect the confidentiality (privacy) of their employers or clients irrespective of whether or not a formal confidentiality agreement has been signed.<br />Competence<br />Engineers should not misrepresent their level of competence (capability). They should not knowingly accept work which is outside their competence.<br /><br />Issues of professional responsibility<br />Intellectual property rights<br />Engineers should be aware of local laws governing the use of intellectual (scholar) property such as patents (exclusive rights), copyright, etc. They should be careful to ensure that the intellectual property of employers and clients is protected.<br />Computer misuse<br />Software engineers should not use their technical skills to misuse other people’s computers. Computer misuse ranges from relatively trivial (game playing on an employer’s machine, say) to extremely serious (dissemination (distribution) of viruses).<br />Ethical dilemmas<br />Disagreement in principle with the policies of senior management<br />Your employer acts in an unethical way and releases a safety-critical system without finishing the testing of the system<br />Participation in the development of military weapons systems or nuclear systemsSumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-44187006416796060172008-08-11T23:29:00.001-07:002008-12-22T20:24:24.850-08:00Project Management Concepts<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///D:%5CDOCUME%7E1%5Cshesu04%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_filelist.xml"><title>© Moreniche</title><!--[if gte mso 9]><xml> <o:documentproperties> <o:author>Marcus Polo</o:Author> <o:version>11.9999</o:Version> </o:DocumentProperties> </xml><![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-alt:Wingdings; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:SimSun; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:ËÎÌå; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@SimSun"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:"\@Arial Unicode MS"; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:29039223; mso-list-type:hybrid; mso-list-template-ids:-382307402 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.75in; mso-level-number-position:left; margin-left:.75in; text-indent:-.25in; font-family:Symbol;} @list l1 {mso-list-id:370425809; mso-list-type:hybrid; mso-list-template-ids:-280861422 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l1:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} @list l2 {mso-list-id:537009114; mso-list-type:hybrid; mso-list-template-ids:1474037886 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l2:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; margin-left:1.0in; text-indent:-.25in; font-family:Symbol;} @list l3 {mso-list-id:697508205; mso-list-type:hybrid; mso-list-template-ids:2416522 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l3:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} @list l4 {mso-list-id:1380321326; mso-list-type:hybrid; mso-list-template-ids:-197218026 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l4:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; font-family:Symbol;} @list l5 {mso-list-id:1393383196; mso-list-type:hybrid; mso-list-template-ids:1198978996 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l5:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.75in; mso-level-number-position:left; margin-left:.75in; text-indent:-.25in; font-family:Symbol;} @list l5:level2 {mso-level-number-format:bullet; mso-level-text:o; mso-level-tab-stop:1.25in; mso-level-number-position:left; margin-left:1.25in; text-indent:-.25in; font-family:"Courier New";} @list l6 {mso-list-id:1423838202; mso-list-type:hybrid; mso-list-template-ids:1920615232 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l6:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; margin-left:1.0in; text-indent:-.25in; font-family:Symbol;} @list l7 {mso-list-id:1525053887; mso-list-type:hybrid; mso-list-template-ids:341220552 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l7:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:66.0pt; mso-level-number-position:left; margin-left:66.0pt; text-indent:-.25in; font-family:Symbol;} @list l8 {mso-list-id:1768697942; mso-list-type:hybrid; mso-list-template-ids:857098752 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l8:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:57.0pt; mso-level-number-position:left; margin-left:57.0pt; text-indent:-.25in; font-family:Symbol;} @list l9 {mso-list-id:1803040854; mso-list-type:hybrid; mso-list-template-ids:-478366102 67698689 67698691 67698693 67698689 67698691 67698693 67698689 67698691 67698693;} @list l9:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:1.0in; mso-level-number-position:left; margin-left:1.0in; text-indent:-.25in; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal"><b style=""><span style="font-size: 14.5pt;">
<br /><o:p></o:p></span></b></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;">Management Spectrum<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">Effective software project management focuses on the four P’s:<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">People, Product, Process and Project<o:p></o:p></span></p> <ul style="margin-top: 0in;" type="disc"><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The manager who forgets the software engineering work is an intensely or extremely human endeavor or effort will never have success in project management.<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The manager who fails to encourage comprehensive or broad customer communication early in the evolution or development of a project with risk of building an elegant solution for wrong problem. <o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The manager who pays little attention to technical methods and tools concerning to process run with risk of inserting into a vacuum.<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The manager who embarks or get on without project plan jeopardizes or endanger the success of the product.<o:p></o:p></span></li></ul> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">People<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Most important element of a successful project<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><span style=""> </span><b style=""><span style=""> </span>Product<o:p></o:p></b></span></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The software to be built<o:p></o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span>Process<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The set of framework activities and software engineering tasks to get the job done<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><span style=""> </span><b style="">Project<o:p></o:p></b></span></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">All work required to make the product a reality<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;">People<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">People factor is so important that the Software Engineering Institute <b style="">(SEI)</b> has developed a <b style="">People Management Capability Maturity Model (PM-CMM) </b>to enhance the willingness or readiness of software organizations to undertake or take on increasingly complex software applications by helping to attract, grow, motivate, deploy and retain the talent needed to improve their software development capability.<span style=""> </span><o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">The people management maturity model defines the following areas for software people:<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">Recruiting, training, selection, performance, management, career development, compensation (repay, return), organization and work design and team/culture development.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;">Product<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">Before a project can be planned:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Product objectives and scope should be established<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Alternative solutions should be considered<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 66pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Technical and management constraints (limitations) should be identified<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 66pt;"><span style="font-size: 11.5pt;">i.e. estimates of cost, effective assessment (evaluation) of risk, realistic breakdown of project tasks, or manageable project schedule.<o:p></o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;">Process<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 11.5pt;">A software process provides the framework for which a comprehensive plan for software development can be established<o:p></o:p></span></p> <ul style="margin-top: 0in;" type="disc"><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">Task sets – task, milestones, work products, and quality assurance points<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">Umbrella activities – software quality assurance, software configuration management, and measurement<o:p></o:p></span></li></ul> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">Project<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">Reasons for doing a software project<o:p></o:p></span></b></p> <ul style="margin-top: 0in;" type="disc"><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">To manage complexity<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">To avoid failure<o:p></o:p></span></li></ul> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;">To develop a common sense approach for planning, monitoring, and controlling the project<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">People<o:p></o:p></span></b></p> <ul style="margin-top: 0in;" type="disc"><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The Players<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">Team Leaders<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">The Software Team<o:p></o:p></span></li><li class="MsoNormal" style=""><span style="font-size: 11.5pt;">Coordination and Communication Issues<o:p></o:p></span></li></ul> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">The Players<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;">Five categories:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Senior Managers:</span></b><span style="font-size: 11.5pt;"> defines business issues that often have significant influence on the project<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Project (technical) managers:</span></b><span style="font-size: 11.5pt;"> plan, motivate, organize and control the practitioners<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Practitioners:</span></b><span style="font-size: 11.5pt;"> deliver the technical skills that are necessary to engineer, a product or application<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.5in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Customers:</span></b><span style="font-size: 11.5pt;"> specify the requirements for the software to be engineered or made<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.5in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">End-Users:</span></b><span style="font-size: 11.5pt;"> interact with the software once it is released for production use<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;">Team Leaders<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;">Project management is a people-intensive activity and for this reason, competent practitioners often make poor team leaders. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.5in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">MOI<span style=""> </span>model for leadership:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1.25in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: "Courier New";"><span style="">o<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Motivation:</span></b><span style="font-size: 11.5pt;"> ability to encourage technical people to produce to their best ability<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1.25in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: "Courier New";"><span style="">o<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Organization:</span></b><span style="font-size: 11.5pt;"> ability to mold existing processes (or inventing new ones) will enable the initial concept to be translated into a final product<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1.25in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: "Courier New";"><span style="">o<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Ideas for innovation (originality):</span></b><span style="font-size: 11.5pt;"> ability to encourage people to create and feel creative even when they must work within bounds established for a particular software product or application.<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span>Software Team<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><span style=""> </span>The following options are available for applying human resources to a project that will require <i style="">n</i> people working for <i style="">k </i>years:<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><i style=""><span style="font-size: 11.5pt;">n</span></i><span style="font-size: 11.5pt;"> individuals are assigned to <i style="">m </i>different functional tasks. Coordination is the responsibility of a software manager who has six other projects to be concerned with.<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><i style=""><span style="font-size: 11.5pt;">n </span></i><span style="font-size: 11.5pt;">individuals are assigned to <i style="">m</i> different functional tasks so that informal teams are established. An adhoc team leader may be appointed; coordination is the responsibility of a software manager.<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><i style=""><span style="font-size: 11.5pt;">n </span></i><span style="font-size: 11.5pt;">individuals are organized into <i style="">t</i> teams; each team is assigned one or more functional tasks; each team has a specific structure that is defined for all teams working on a project.<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: 0.25in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: 0.25in;"><span style="font-size: 11.5pt;">Mantei suggests three generic (broad) team organizations:<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Democratic decentralized (DD):</span></b><span style="font-size: 11.5pt;"> no permanent leader, rather than task coordinator are appointed for short duration. Decisions on problems and approach are made by group consensus (cooperation). <i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Controlled decentralization (CD): </span></b><span style="font-size: 11.5pt;">this software engineering team has defined leader who coordinates specific tasks and secondary leaders that have responsibility for subtask. Problem solving is a group activity, but implementation of solutions is partitioned among subgroups by the team leader.<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><b style=""><span style="font-size: 11.5pt;">Controlled Centralized (CC): </span></b><span style="font-size: 11.5pt;">Top-level problem solving and internal team coordination are managed by a team leader.<i style=""><o:p></o:p></i></span></p> <p class="MsoNormal" style="margin-left: 0.75in;"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.75in;"><span style="font-size: 11.5pt;">Mantei describes seven project factors that should be considered when planning the structure of software engineering teams.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The difficulty of the problem to be solved<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The size of the resultant program(s) in lines of code or function points<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The time that the team will stay together (team lifetime)<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The degree to which the problem can be modularized<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The required quality and reliability of the system to be built<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The rigidity of the delivery date<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 57pt; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">The degree of sociability or friendliness (communication) required for the project<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 39pt;"><span style="font-size: 11.5pt;"><span style=""> </span><b style=""><o:p></o:p></b></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span>Coordination and Communication Issues<o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><span style=""> </span><o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><span style=""> </span>There are many reasons that software projects get into trouble<o:p></o:p></span></p> <p class="MsoNormal"><span style="font-size: 11.5pt;"><span style=""> </span><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Scalability: </span></b><span style="font-size: 11.5pt;">The scale (extent, range) of many development efforts is large, leading to complexity, confusion and significant (important) difficulties in coordinating team members<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Uncertainty: </span></b><span style="font-size: 11.5pt;">Uncertainty is common, resulting in a continuing stream of changes that ratchets (group) the project team.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Interoperability: </span></b><span style="font-size: 11.5pt;">Interoperability has become a key characteristic of many systems. New software must communicate with existing software and conform to predefined constraint imposed by system or product. <o:p></o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span></span></b><span style="font-size: 11.5pt;"><o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">Kraul and Streeter examine a collection of project coordination techniques that are categorized in the following manner.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in; text-indent: 0.25in;"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in; text-indent: 0.25in;"><b style=""><span style="font-size: 11.5pt;">Formal, impersonal approaches<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">Include software engineering documents including project milestones, schedules and project control tools, change requests and related documentation, error tracking reports etc.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span><span style=""> </span>Formal, interpersonal procedures<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">Focus on quality assurance activities applied to software engineering work products. These include status review meeting and design and code inspections.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span>Informal, interpersonal procedures<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.25in;"><span style="font-size: 11.5pt;"><span style=""> </span>Include group meetings for information distribution and problem solving<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.25in;"><b style=""><span style="font-size: 11.5pt;"><span style=""> </span>Electronic communication<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">Encompasses electronic mail, electronic bulletin boards and video conferencing systems.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Interpersonal networking<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">Includes informal discussions with team members and those outside the project who may have experience or insight that can assist team members.<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Critical Practices<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><span style="font-size: 11.5pt;">The Airlie Council (a team of software engineering experts chartered by U.S Department of Defense to help to develop guidelines for best practices in software project management and software engineering).<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Formal risk management<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">What are the top or main risks for the project?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">For each of the risks what is the chance that risk will become a problem and <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">What is the impact if it does?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Empirical cost and schedule estimation<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">What is the current estimation size of the application software that will be delivered into operation (excluding system software) i.e. what is the development cost estimation. <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">How was it derived and can be derived?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Metric-based project management<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Do you have in place a metric program to give an early indication of evolving problems? If so, what is the current requirement instability concerning to problems?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Earned value tracking<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Do you report monthly earned value metrics? If so are these metrics computed from an activity network tasks for the entire effort to the next delivery?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">Defect tracking against quality targets<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">Do you track and periodically report the number of defects found by inspection (formal technical review) and execution test from the start of program and the number of defects currently closed and open?<o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.5in;"><b style=""><span style="font-size: 11.5pt;">People-aware program management<o:p></o:p></span></b></p> <p class="MsoNormal" style="margin-left: 1in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="font-size: 11.5pt; font-family: Symbol;"><span style="">·<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span></span><!--[endif]--><span style="font-size: 11.5pt;">What is the average staff proceeding for the past three months for each of the developers involved in the development of software for this system? <o:p></o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> <p class="MsoNormal" style="margin-left: 0.75in;"><span style="font-size: 11.5pt;"><o:p> </o:p></span></p> Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-75130418929843899442008-08-11T23:28:00.002-07:002008-12-22T20:24:24.850-08:00Intellectual Property Rights (IPR) Issues<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///D:%5CDOCUME%7E1%5Cshesu04%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_filelist.xml"><title>© Moreniche</title><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="country-region"></o:smarttagtype><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="City"></o:smarttagtype><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="place"></o:smarttagtype><!--[if gte mso 9]><xml> <o:documentproperties> <o:author>Marcus Polo</o:Author> <o:version>11.9999</o:Version> </o:DocumentProperties> </xml><![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id="ieooui"></object> <style> st1\:*{behavior:url(#ieooui) } </style> <![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-alt:Wingdings; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:SimSun; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:ËÎÌå; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:Verdana; panose-1:2 11 6 4 3 5 4 4 2 4; mso-font-alt:Verdana; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:536871559 0 0 0 415 0;} @font-face {font-family:"\@SimSun"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:"\@Arial Unicode MS"; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:TimesNewRoman; panose-1:0 0 0 0 0 0 0 0 0 0; mso-font-charset:0; mso-generic-font-family:auto; mso-font-format:other; mso-font-pitch:auto; mso-font-signature:3 0 0 0 1 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} p {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:1495295057; mso-list-template-ids:-1482514866;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Wingdings;} @list l0:level2 {mso-level-tab-stop:1.0in; mso-level-number-position:left; text-indent:-.25in;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p class="MsoNormal"><b style=""><span style="font-family: Verdana;"><o:p> </o:p></span></b></p> <p class="MsoNormal"><b style=""><span style="font-family: Verdana;">
<br /><o:p></o:p></span></b></p> <p class="MsoNormal"><span style="font-size: 10pt; font-family: Verdana;"><o:p> </o:p></span></p> <p class="MsoNormal">Intellectual Property Rights (IPR), very broadly, are rights granted to creators and owners of works that are results of human intellectual creativity. These works can be in the industrial, scientific, literary and artistic domain.</p> <p>For example, we could publish a book based on someone else's, or pirate software. Things such as software and a story in the book are intangible - they can't be physically stolen - and are called <em>intellectual property</em>.</p> <p>Such creative works and inventions may be valuable because their creators may benefit from selling them or licensing others to use them. Society, therefore, gives the creator intellectual property rights</p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">Industrial property <b style="">legislation</b> is part of the wider body of law known as intellectual property. The term intellectual property refers broadly to the creations of the human mind. Intellectual property rights protect the interests of creators by giving them property rights over their creations.<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">The <i>Convention Establishing the World Intellectual Property Organization </i>(1967) does not seek to define intellectual property, but gives the following list of the subject matter protected by intellectual property rights:<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">literary, artistic and scientific works; <o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">performances of performing artists, phonograms, and broadcasts;<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">inventions in all fields of human endeavor;<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">scientific discoveries;<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">industrial designs;<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">trademarks, service marks, and commercial names and designations;<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">protection against unfair competition; and<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">“all other rights resulting from intellectual activity in the industrial,<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">scientific, literary or artistic fields.”<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">Intellectual property relates to items of information or knowledge, which can be incorporated in tangible objects at the same time in an unlimited number of copies at different locations anywhere in the world. The property is not in those copies but in the information or knowledge reflected in them. Intellectual property rights are also characterized by certain limitations, such as limited duration in the case of copyright and patents.<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">The importance of protecting intellectual property was first recognized in the <i>Paris Convention for the Protection of Industrial Property </i>in 1883 and the <i>Berne Convention for the Protection of Literary and Artistic Works </i>in 1886. Both treaties are administered by the World Intellectual Property Organization (WIPO).<o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="color: rgb(35, 31, 32);">Countries generally have laws to protect intellectual property for two main reasons. One is to give statutory expression to the moral and economic rights of creators in their creations and to the rights of the public in accessing those creations. The second is to promote creativity and the dissemination and application of its results, and to encourage fair trade, which would contribute to economic and social development. </span><span style="color: black;"><o:p></o:p></span></p> <p><b style=""><span style="font-family: Verdana;">Intellectual Property Law (IP)</span></b><b style=""><span style="font-size: 14pt;"><o:p></o:p></span></b></p> <p>In general, the objective of IPR is to protect the right of a copyright author in his work and at the same time allow the general public to access his creativity. IPR maintains this balance by putting in place time-limits on the author’s means of controlling a particular work. The law that regulates the creation, use and control of the protected work is popularly known as Intellectual Property Law (IP).</p> <p><a name="Types"></a><strong><span style="font-size: 10pt; font-family: Verdana;">Types of Intellectual Property Rights</span></strong><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p><a name="What"></a><strong><span style="font-size: 10pt; font-family: Verdana;">1. What is a Copyright?</span></strong><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p>Copyright protects artistic (pictures, sound recordings, films) and literary (books, software, design drawings) works from being copied or adapted without permission. The rights exist automatically on the creation of the work. It does not have to be registered. However, the work itself must be <i>original</i> (i.e. the creator's own work). Others can create similar works, providing they do so independently.</p> <p><a name="Rights"></a><strong><span style="font-size: 10pt; font-family: Verdana;">2. Copyright law gives exclusive rights </span></strong><strong><span style="font-size: 10pt; font-family: Verdana;">to the owner of copyright</span></strong><span style="font-size: 10pt; font-family: Verdana;"><o:p></o:p></span></p> <p>Copyright grants certain rights that are exclusive to its owner. Based on these rights, the copyright owner </p> <p>(a) can copy the work</p> <p>(b) issue copies of the work to the public </p> <p>(c) rent or lend the work to the public </p> <p>(d) perform, show or play the work in public </p> <p>(e) communicate the work to the public – this includes broadcasting of a work and also electronic transmission and</p> <p>(f) make an adaptation of the work or do any of the above in relation to an adaptation </p> <p><o:p> </o:p></p> <p><b style=""><span style="font-size: 12.5pt; font-family: TimesNewRoman;">Industrial Property</span></b><b style=""><span style="font-size: 11pt; font-family: Verdana;"><o:p></o:p></span></b></p> <p>industrial property - protection through patent, trademarks, design and other law for industrial processes, manufactured objects, names/symbols and breeding.</p> <p class="MsoNormal" style="text-align: justify;"><span style="color: rgb(35, 31, 32);">“Industrial property shall be understood in the broadest sense and shall apply not only to industry and commerce proper, but likewise to agricultural and extractive industries and to all manufactured or natural products, for example, wines, grain, tobacco leaf, fruit, cattle, minerals, mineral waters, beer, flowers, and flour.” I<o:p></o:p></span></p> <p class="MsoNormal" style="text-align: justify;"><span style="color: rgb(35, 31, 32);">Industrial property takes a range of forms, the main types of which will be outlined in this booklet. These include patents to protect inventions; and industrial designs, which are aesthetic creations determining the appearance of industrial products. Industrial property also covers trademarks, service marks, layout-designs of integrated circuits, commercial names and designations, as well as geographical indications, and protection against unfair competition. In some of these, the aspect of intellectual creation, although existent, is less clearly defined. What counts here is that the object of industrial property typically consists of signs transmitting information, in particular to consumers, as regards products and services offered on the market. Protection is directed against unauthorized use of such signs likely to mislead consumers, and against misleading practices in general.</span><span style="color: black;"><o:p></o:p></span></p> <p class="MsoNormal" style=""><span style="font-size: 11.5pt; font-family: TimesNewRoman;"><o:p> </o:p></span></p> <p class="MsoNormal" style=""><b style=""><span style="font-size: 12.5pt; font-family: TimesNewRoman;">Trade Marks and laws relating to designs</span></b><b style=""><span style="font-size: 11pt; font-family: TimesNewRoman;"><o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">A trademark is a <b>distinctive sign</b> which identifies certain goods or services as those produced or provided by a specific person or enterprise. Its origin dates back to ancient times, when craftsmen reproduced their signatures, or "marks" on their artistic or utilitarian products. Over the years these marks evolved into today's system of trademark registration and protection. The system helps consumers identify and purchase a product or service because its nature and quality, indicated by its <b>unique</b> trademark, meets their needs</span><span style="font-size: 9pt; font-family: Arial; color: rgb(51, 51, 51);">.</span><span style="font-size: 9pt; font-family: Arial;"><o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><b><span style="font-size: 16pt; font-family: Arial;">Industrial Designs<o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; margin-top: 3pt; line-height: 12pt; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><a name="P1_0"></a><b><span style="font-size: 11.5pt; font-family: Arial; color: rgb(51, 51, 51);">What is an industrial design?<o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">An industrial design is the <b>ornamental or aesthetic</b> (artistic, visual) aspect of an article. The design may consist of three-dimensional features, such as the <b>shape or surface</b> of an article, or of two-dimensional features, such as <b>patterns</b>, <b>lines</b> or <b>color</b>.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Industrial designs are applied to a wide variety of products of industry and handicraft: from technical and medical instruments to watches, jewelry, and other luxury items; from housewares and electrical appliances to vehicles and architectural structures; from textile designs to leisure goods.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">To be protected under most national laws, an industrial design must <b>appeal to the eye</b>. This means that an industrial design is primarily of an aesthetic nature, and does not protect any technical features of the article to which it is applied<i>.<o:p></o:p></i></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; margin-top: 3pt; line-height: 12pt; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><a name="protect"></a><b><span style="color: rgb(51, 51, 51);">Why protect industrial designs?<o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Industrial designs are what make an article <b>attractive</b> and <b>appealing</b>; hence, they add to the <b>commercial value</b> of a product and <b>increase its marketability</b>. <o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">When an industrial design is protected, the <b>owner</b> - the person or entity that has registered the design - is assured an exclusive right against <b>unauthorized copying or imitation of the design</b> by third parties. This helps to ensure a fair return on investment. An effective system of protection also benefits <b>consumers and the public at large</b>, by promoting fair competition and honest trade practices, encouraging creativity, and promoting more aesthetically attractive products. <o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Protecting industrial designs helps <b>economic development</b>, by encouraging creativity in the industrial and manufacturing sectors, as well as in traditional arts and crafts. They contribute to the expansion of commercial activities and the export of national products.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Industrial designs can be relatively simple and inexpensive to develop and protect. They are reasonably accessible to small and medium-sized enterprises as well as to individual artists and craftsmen, in both industrialized and developing countries.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; margin-top: 3pt; line-height: 12pt; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><a name="how_to_protect"></a><b><span style="color: rgb(51, 51, 51);">How can industrial designs be protected?<o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">In most countries, an industrial design must be registered in order to be protected under industrial design law. As a general rule, to be registryable, the design must be <b><i>"new</i></b><i>"</i> or <b>"<i>original"</i></b>. Different countries have varying definitions of such terms, as well as variations in the registration process itself. Generally, "new" means that no identical or very similar design is known to have existed before. Once a design is registered, a registration certificate is issued. Following that, the term of protection is generally five years, with the possibility of further periods of renewal up to, in most cases, 15 years.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Depending on the particular national law and the kind of design, an industrial design may also be <b>protected as a work of art</b> under <b>copyright</b> <b>law</b>. In some countries, industrial design and copyright protection can exist concurrently. In other countries, they are mutually exclusive: once the owner chooses one kind of protection, he can no longer invoke the other.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Under certain circumstances an industrial design may also be protectable under <b>unfair competition law</b>, although the conditions of protection and the rights and remedies ensured can be significantly different.<o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; margin-top: 3pt; line-height: 12pt; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><a name="how_extensive"></a><b><span style="color: rgb(51, 51, 51);">How extensive is industrial design protection?<o:p></o:p></span></b></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);">Generally, industrial design protection is limited to the country in which protection is granted. Under <st1:place st="on"><st1:city st="on">the <b>Hague</b></st1:city></st1:place><b> Agreement Concerning the International Deposit of Industrial Designs</b><o:p></o:p></span></p> <p class="MsoNormal" style="background: white none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><span style="color: rgb(51, 51, 51);"><o:p> </o:p></span></p> <p><o:p> </o:p></p> <p><span style="font-size: 10pt; font-family: Verdana;"><o:p> </o:p></span></p> <p><b style="">Dealing with copyright and originality<o:p></o:p></b></p> <p><strong>Laws on Copyright</strong></p> <p>Currently, copyright law in the <st1:place st="on"><st1:country-region st="on">UK</st1:country-region></st1:place> is governed by the Copyright, Designs and Patents Act 1988 (the Act). Part I of the Act deals with copyright law. It has been subject to various amendments and the latest amendments of October 2003 were aimed at bringing the Act in line with the EU Directive on Copyright and Related Rights in the Information Society (EU Copyright Directive) 2001 and the challenges posed by the Internet. The <st1:place st="on"><st1:country-region st="on">UK</st1:country-region></st1:place> being a member of various international conventions and treaties on copyright law, the Act was also amended at various occasions to harmonize it with the provisions of international treaties.</p> <p><strong>Works protected by Copyright</strong></p> <p>The types of copyright works are broadly categorized into: </p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">1.<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span><!--[endif]-->original literary, dramatic, artistic or musical works, </p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">2.<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span><!--[endif]-->sound recordings, films or broadcasts and </p> <p class="MsoNormal" style="margin-left: 0.5in; text-indent: -0.25in;"><!--[if !supportLists]--><span style="">3.<span style="font-family: "Times New Roman"; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal;"> </span></span><!--[endif]-->the typographical arrangement of published editions. </p> <p>Literary work also includes </p> <p>(a) a table or compilation other than a database,</p> <p>(b) a computer program, </p> <p>(c) preparatory design material for a computer program and</p> <p>(d) a database. </p> <p>Dramatic work includes a work of dance or mime. Musical work means any work consisting of music but excludes the words and music of songs. </p> <p><strong>Infringement of Copyright</strong></p> <p><strong>When is a work infringed?</strong> Copyright is said to be infringed when one of the exclusive rights of an author is performed by a party without the consent or authorization of the author. This infringement is called primary infringement. Providing accessories for infringing the exclusive rights or assisting in the making or distribution of infringing copies is also treated as an infringement and is referred to as secondary infringement. </p> <p><strong>Making temporary copies: </strong>Browsing of the Internet creates temporary copies of web pages on the cache of a computer. Until 2003, such temporary copies were considered as infringing copies. The new law has however changed the position. It clearly states that the making of temporary copies is not an infringement so long as it is a transient copy, has no economic significance and is done solely for the transmission of a work or for its lawful use. The same rule applies in the case of sending copyright work by means of fax. </p> <p><a name="Exceptions"></a><strong>Exceptions to Copyright Infringement </strong></p> <p>Copyright law provides a catalogue of basic exceptions and defenses. It permits the use of copyright works for situations considered as ‘fair’, if permitted by a license, or if permitted under a right holders guidance or notice. </p> <p>Fair dealing with a copyright work constitutes one of the significant of these permitted acts. The scope of fair dealing in some specific situations of importance to FE and HE is detailed below:</p> <p><strong>Research or private study:</strong> Research or private study is not collective but are individual acts. The current <st1:country-region st="on"><st1:place st="on">UK</st1:place></st1:country-region> copyright law permits copying of works for research or private study only if it is aimed at a non-commercial purpose. The law also requires that sufficient acknowledgment be given to the copied source when used in research or private study. For academic staff and research students in FE and HE, this creates an obligation of using proper citations during publications. The only exception is situations where acknowledgement would be impossible for practical reasons.</p> <p><strong>Educational purposes: </strong>Fair dealing with copyright works in the educational environment is permitted if the source is acknowledged, not done through reprographic means (e.g. multiple photocopying, faxing, scanning) and not aimed at a commercial purpose. Thus, a teacher instructing students in a commercial FE or HE institute (e.g. profit oriented ones) or imparting training courses to external company staff should be aware that hand outs and materials for such events observe these guidelines. For teachers involved in setting examination papers, the law requires them to include sufficient acknowledgement of the copied matter where practicable. Students answering these questions in exams are luckily exempt from the requirement. The law also covers the recording of web broadcasts by educational establishments. Primarily, to record a transmitted broadcast FE or HE institutes would need an ERA licence. In the absence of such a licence, the FE or HE can make use of the broadcast only if it acknowledges recording of the data or uses it for non-commercial purposes and transmits it only to persons within the premises of the educational establishment. In practice, this can prevent the commercial FE or HE institutes (without ERA) from recording and re-broadcasting content through e-transmissions for distance learning purposes on internet or an intranet.</p> <p><strong>Library uses: </strong>The making of copies from books in libraries by its users (staff or students) is fair dealing only if it is made for research or private study for non-commercial purposes. This would require the user to sign a copyright declaration form confirming that the use is purely non-commercial prior to making a request.</p> <p><strong>Criticism and review:</strong> Fair dealing for criticism and review is permitted under the new law only if it is accompanied by sufficient acknowledgement and the work is made available to the public. </p> <p><strong>Visually impaired people:</strong> The new law has created special exceptions for visually impaired people. A visually impaired person or FE or HE institute may make copies for a visually impaired person if it is for his/her personal use. But this is subject to the condition that the visually impaired person or the institute already has legitimate master copy (bought or borrowed) and that a copy of the work is not commercially available. An additional exception that caters to visually impaired persons allows the making of multiple copies if the author of the work is acknowledged and if the making of the copy does not interfere with the legitimate exploitation of the work.</p> <p><span style="font-size: 10pt; font-family: Verdana;"><o:p> </o:p></span></p> Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-75847874658256602682008-08-11T23:28:00.001-07:002008-12-22T20:24:24.850-08:00Software Licensing and its types or methods <meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///D:%5CDOCUME%7E1%5Cshesu04%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_filelist.xml"><title>© Moreniche</title><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="country-region"></o:smarttagtype><o:smarttagtype namespaceuri="urn:schemas-microsoft-com:office:smarttags" name="place"></o:smarttagtype><!--[if gte mso 9]><xml> <o:documentproperties> <o:author>Marcus Polo</o:Author> <o:version>11.9999</o:Version> </o:DocumentProperties> </xml><![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><!--[if !mso]><object classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id="ieooui"></object> <style> st1\:*{behavior:url(#ieooui) } </style> <![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:SimSun; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:ËÎÌå; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@SimSun"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:"\@Arial Unicode MS"; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} p {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--><p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><a name="Introduction"><b><span style="font-size: 14pt;">Introduction</span></b></a><b><span style="font-size: 14pt;"><o:p></o:p></span></b></p> <p><a name="Personal_Use"><b><span style="" lang="EN">Software licensing</span></b></a><span style=""><span style="" lang="EN"> comprises the permissions, rights and restrictions imposed on software (whether a component or a free-standing program). Use of software without a license could constitute infringement of the owner's intellectual property rights, and allow the owner to sue the infringer.<o:p></o:p></span></span></p> <p><span style=""><span style="" lang="EN">Under a software license, the licensee is permitted to use the licensed software in compliance with the specific terms of the license. If there is a breach of the license, depending on the license it may result in termination of the license, and potentially the right of the owner to sue.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style=""><b>Personal Use</b></span><b><o:p></o:p></b></p> <p><span style="color: black;">This usually means that you may use the software only for "personal" matters unconnected with your work or profession. It could be quite difficult for the University to argue that software on a University owned PC was for "personal use". Some shareware products offer this kind of personal use discretion but if you install such software at work you will probably be required to obtain a full license.<o:p></o:p></span></p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><a name="Educational_Use"><b>Educational Use</b></a></p> <p><span style="color: black;">This is probably the most difficult one to define as it can mean different things with different software - it may be completely open in that, the software can be used for any purpose by anyone in the relevant educational establishment whether it be commercial or teaching purposes or it may mean that the software can only be used in a teaching and learning context or it may mean that it can only be used for educational research. <o:p></o:p></span></p> <p class="MsoNormal"><a name="Normal_Use"><b>Normal Use</b></a></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="color: black;">This usually means a full licensed copy, which we may or may not have bought with an educational discount, but which has no unusual restrictions on how we use it. Remember unless extras licenses have been bought it may usually only be installed on one machine - so if you need the same software at home a second copy will usually have to be purchased.<o:p></o:p></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><b style=""><span style="font-size: 14pt; color: black;">Licensing Methods or Types<o:p></o:p></span></b></p> <p class="MsoNormal"><a name="Freeware"><b><o:p> </o:p></b></a></p> <p class="MsoNormal"><span style=""><b>Freeware</b></span></p> <p class="MsoNormal"><span style="color: black;">You would think that this must be OK - but it often is not. Frequently the words "not for commercial use" or something similar appear in the small print - you always need to verify that whatever you plan to use it for fits the license terms. An important point to remember is that freeware is almost always unsupported and so if something goes wrong you are "on your own". Always view the word FREE with suspicion!<o:p></o:p></span></p> <p><a name="Shareware"><b>Shareware</b></a></p> <p><span style="color: black;">Usually this means that the product is made available for evaluation, either from a CD or a download from the internet. Shareware comes with a license usually for the specific purpose of testing the product to see if you want to buy it. Some shareware is restricted by the software itself to a certain number of days or uses and in some cases functionality is restricted to discourage illegal use. Other more lax companies simply rely on a "nag" screen which appears on start up, or just on the honesty of the individual. There is rarely a situation where you can legally make use of shareware indefinitely and, like freeware it, is usually unsupported. IMPORTANT it can be difficult to prove that you are no longer using software which is still installed on your computer - it is strongly recommended that you remove any shareware after the evaluation period. The classic example here is WINZIP - the download of this evaluation software is widely encouraged from websites. The University do NOT have a site license for WinZip and it should not be installed on any UWS machine without purchase of a license<o:p></o:p></span></p> <p><b>ANY SHAREWARE INSTALLED FOR EVALUATION SHOULD BE UNINSTALLED THROUGH CONTROL PANEL BY THE END OF THE EVALUATION PERIOD</b></p> <p class="MsoNormal"><a name="Demo"><b>Demo</b></a><b><o:p></o:p></b></p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><span style="color: black;">Generally these are less of a problem as they usually have highly restricted functionality - allowing you to look at the product but not really use it. Again though check the license screen carefully - some "demos" are really "shareware".<o:p></o:p></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><a name="Full_Package"><b>Full Package</b></a></p> <p><span style="color: black;">OK - you pop along to PC World, shell out for the shrink wrapped box - great you "own" the product now! - WRONG! what you "own" is a CD with something on it, some pieces of paper, if you are lucky a manual and a pretty useless box. What you can do with the "something" on the CD depends on - you've guessed it - the license. You will often find that the same product has several different prices according to the license terms so check carefully before you buy! Generally speaking most products have a license to install the software on one computer at a time and with some companies your license may not be valid for use until you have registered it with them. Some companies (though thankfully these are few) even restrict you from passing the license on to someone else when you have finished with it. <o:p></o:p></span></p> <p><span style="color: black;">If you transfer software from one computer to another then </span><b>you should remove it from the first one before installing it on another</b><span style="color: black;">. Some companies allow you specifically to install a second copy so you can, for example use the product both at home and at work or on a laptop. However if, for example, you are using it at work and your partner is using it at home at the same time, this probably contravenes the strict letter of the license. <o:p></o:p></span></p> <p><span style="color: black;">There is no easy route through this one - check the box, check the license and if necessary check the companies website or e-mail their sales department before you buy. It is particularly important to check that software is "fit for purpose" when ordering on behalf of the University. If you have any doubts please check with Software Manager.<o:p></o:p></span></p> <p class="MsoNormal"><a name="License_only"><b>License only</b></a></p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><span style="color: black;">We frequently buy several (or even many) software licenses without media. These are licenses which allow you to install copies on a number of machines from one CD (like the one's you may borrow from IT Support). Such licenses do not usually entitle you to make copies of the software CD! Additional copies of the media CD can usually be ordered at a reasonable price.<o:p></o:p></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><a name="Upgrades"><b>Upgrades</b></a></p> <p><span style="color: black;">Upgrade "paths" are often available and are designed to encourage you, or in company jargon "make it easier for you", to upgrade to the latest version of a product you already own. Frequently what you get when you buy an upgrade is a completely new software installation but to install an upgrade you must legally own the relevant software in the first place. Some software installations check this automatically, while some companies ask you to provide proves of owning the earlier version however many more simply take it on trust. You may pay £80 say for an upgrade to XYZ version 2 but if you didn't already own XYZ version 1 the installation will be illegal.
<br />Generally installing an upgrade implies that you will no longer be using the original version - </span><b>remember you only have on license so passing the old disc to your children etc would be illegal<span style="color: red;">.</span></b><span style="color: black;"><o:p></o:p></span></p> <p><span style="color: black;">Sometimes you can buy an upgrade for a package if you own a similar package produced by another company - this is called COMPETITIVE UPGRADE - and is designed to woo you away from your usual software. You see less of this around these days but often it provides a good way of getting a better product than the one that came with your PC when you bought it. Competitive upgrades are a less frequent option these days.<o:p></o:p></span></p> <p class="MsoNormal"><a name="Open_source"><b>Open source</b></a></p> <p><span style="color: black;">You sometimes see "open source" software (eg Linux) which generally means that you are allowed to open the source code and make changes to the way the package works and maybe incorporate it into your own software. "Open source" does not always equal FREE. You may have to purchase the right to use and/or adapt the software and there may be restrictions on what parts of a package are open source and which are not. <o:p></o:p></span></p> <p><span style="color: black;">We are often asked why we don't make more use of "open source" software - for example alternatives to MS Office such as Sun's Open Office. The reason is that whilst there seems potentially to be a big saving in software costs this is often outweighed by the need for staff to develop and support the software. The credibility of the software in our marketplace and the fact that important functionality or access to other products may be lost is another factor. <o:p></o:p></span></p> <p><span style="color: black;">That said, there is some serious interest in Open Source among <st1:place st="on"><st1:country-region st="on">UK</st1:country-region></st1:place> universities and a joint effort through UCISA is underway to evaluate the potential that they offer - so this is an area which we keep under constant review <o:p></o:p></span></p> <p class="MsoNormal"><a name="Single_License/Boxed_Product"><b>Single License/Boxed Product</b></a><b><o:p></o:p></b></p> <p class="MsoNormal"><o:p> </o:p></p> <p class="MsoNormal"><span style="color: black;">Usually a single license for a single PC - you may buy multiple copies at a discount but they are still basically the same.<o:p></o:p></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><a name="Concurrent_License"><b>Concurrent License</b></a><b><o:p></o:p></b></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="color: black;">This is really something for network distributed software. Some companies will for example allow us to buy 50 concurrent licenses and make them available to all network users but with a restriction in place so that no more than 50 people can use the software any one time - if 50 people are using the software then the 51st person is denied access until one of the previous 50 exit the software. We use this whenever practicable as it is a very cost effective way of sharing software. The responsibility for restricting the number of users lies with us. The disadvantage of this approach is that those people who do not have access to the Staff Applications Desktop Folder will not be able to use it and will still have to purchase local copies.<o:p></o:p></span></p> <p class="MsoNormal"><a name="Site_License"><b>Site License</b></a><b><o:p></o:p></b></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="color: black;">For widely used software (such as MS Office) this usually represents good value - for an annual payment usually calculated on staff or student numbers - everyone on campus is allowed to install and use the software. Such agreements normally allow you to upgrade free of charge during the life of the agreement and although the annual cost seems high it usually represents a substantial saving over other licensing methods. Not only in cash terms but also because there is no need to maintain records of who uses the software. Some of these agreements also allow for home use by staff and in some cases students as<span style="">.<o:p></o:p></span></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><span style="color: black;"><o:p> </o:p></span></p> <p class="MsoNormal"><b>Note: Illegal use of software, whether deliberate or accidental, is a serious offence and could result in prosecution, fine and/or imprisonment of Senior Management, Head of Department and of Individuals - it could also result in disciplinary action. The overarching principle is that with any new software, or upgrade, you must check the licensing BEFORE installing it</b></p> <p class="MsoNormal"><o:p> </o:p></p> Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0tag:blogger.com,1999:blog-1619478052327503896.post-12362027068927513482008-08-11T23:27:00.000-07:002008-12-22T20:24:24.850-08:00Electronic publishing<meta equiv="Content-Type" content="text/html; charset=utf-8"><meta name="ProgId" content="Word.Document"><meta name="Generator" content="Microsoft Word 11"><meta name="Originator" content="Microsoft Word 11"><link rel="File-List" href="file:///D:%5CDOCUME%7E1%5Cshesu04%5CLOCALS%7E1%5CTemp%5Cmsohtml1%5C06%5Cclip_filelist.xml"><title>© Moreniche</title><!--[if gte mso 9]><xml> <o:documentproperties> <o:author>Marcus Polo</o:Author> <o:version>11.9999</o:Version> </o:DocumentProperties> </xml><![endif]--><!--[if gte mso 9]><xml> <w:worddocument> <w:view>Normal</w:View> <w:zoom>0</w:Zoom> <w:punctuationkerning/> <w:validateagainstschemas/> <w:saveifxmlinvalid>false</w:SaveIfXMLInvalid> <w:ignoremixedcontent>false</w:IgnoreMixedContent> <w:alwaysshowplaceholdertext>false</w:AlwaysShowPlaceholderText> <w:compatibility> <w:breakwrappedtables/> <w:snaptogridincell/> <w:wraptextwithpunct/> <w:useasianbreakrules/> <w:dontgrowautofit/> <w:usefelayout/> </w:Compatibility> <w:browserlevel>MicrosoftInternetExplorer4</w:BrowserLevel> </w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:latentstyles deflockedstate="false" latentstylecount="156"> </w:LatentStyles> </xml><![endif]--><style> <!-- /* Font Definitions */ @font-face {font-family:Wingdings; panose-1:5 0 0 0 0 0 0 0 0 0; mso-font-alt:Wingdings; mso-font-charset:2; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:0 268435456 0 0 -2147483648 0;} @font-face {font-family:SimSun; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:ËÎÌå; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} @font-face {font-family:"\@SimSun"; panose-1:2 1 6 0 3 1 1 1 1 1; mso-font-alt:"\@Arial Unicode MS"; mso-font-charset:134; mso-generic-font-family:auto; mso-font-pitch:variable; mso-font-signature:3 135135232 16 0 262145 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-parent:""; margin:0in; margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} h3 {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; mso-outline-level:3; font-size:13.5pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US; font-weight:bold;} p {mso-margin-top-alt:auto; margin-right:0in; mso-margin-bottom-alt:auto; margin-left:0in; mso-pagination:widow-orphan; font-size:12.0pt; font-family:"Times New Roman"; mso-fareast-font-family:"Times New Roman"; mso-fareast-language:EN-US;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.25in 1.0in 1.25in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} /* List Definitions */ @list l0 {mso-list-id:979727393; mso-list-template-ids:-550070980;} @list l0:level1 {mso-level-number-format:bullet; mso-level-text:; mso-level-tab-stop:.5in; mso-level-number-position:left; text-indent:-.25in; mso-ansi-font-size:10.0pt; font-family:Symbol;} ol {margin-bottom:0in;} ul {margin-bottom:0in;} --> </style><!--[if gte mso 10]> <style> /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times New Roman"; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} </style> <![endif]--> <p><a name="Heading9"><b style=""><span style="font-size: 14pt;"></span></b></a><span style=""><b><span style="font-size: 14pt;" lang="EN"><o:p></o:p></span></b></span></p> <p><span style=""><b><span style="" lang="EN">Electronic publishing</span></b></span><span style=""><span style="" lang="EN"> includes the digital publication of ebooks and electronic articles, and the development of digital libraries. Electronic publishing has become common in scientific publishing where it has been argued that peer-reviewed paper scientific journals are in the process of being replaced by electronic publishing. Although network distribution is nowdays strongly associated with electronic publishing, there are many non network electronic publications such as Encyclopedias on CD and DVD, as well as technical and reference publications relied on by mobile users and others without reliable and high speed access to a network.<o:p></o:p></span></span></p> <p><span style=""><span style="" lang="EN">There is usually a delay of several months after an article is written before it is published in a paper journal and this makes journals not an ideal format for disseminating the latest research. In some fields such as astronomy and some parts of physics, the role of the journal at disseminating the latest research has largely been replaced by preprint databases such as arXiv.org. However, scientific journals still provide an important role in quality control, archiving papers, and establishing scientific credit. In general, the electronic material uploaded to preprint database are still intended for eventual publication in a peer-reviewed journal.<o:p></o:p></span></span></p> <p><span style=""><span style="" lang="EN">There is an article titled "Online or Invisible?" (see link at end of article) which provides statistical evidence that electronic publishing provides wider dissemination. A number of journals have, while retaining their peer review process, established electronic versions or even moved entirely to electronic publication.<o:p></o:p></span></span></p> <p><span style=""><span style="" lang="EN">Electronic publishing is increasingly popular in works of fiction as well as with scientific articles. Electronic publishers are able to provide quick gratification for late-night readers, books that customers might not be able to find in standard book retailers (erotica is especially popular in eBook format), and books by new authors that would be unlikely to be profitable for traditional publishers.<o:p></o:p></span></span></p> <p><span style=""><span style="" lang="EN">Hyponyms are:<o:p></o:p></span></span></p> <ul type="disc"><li class="MsoNormal" style=""><span style=""><span style="" lang="EN">Online publishing <o:p></o:p></span></span></li><li class="MsoNormal" style=""><span style=""><span style="" lang="EN">ePublishing <o:p></o:p></span></span></li><li class="MsoNormal" style=""><span style=""><span style="" lang="EN">Web Publishing <o:p></o:p></span></span></li></ul> <p><span style=""><span style="" lang="EN">While the term "Electronic Publishing" is primarily used today to refer to the current offerings of online and web-based publishers, the term has a history of being used to describe the development of new forms of production, distribution, and user intereaction in regards to computer-based production of text and other interactive media. A good example of this use of the term can be found in the work of Walter Bender and his Electronic Publishing Research Group at the MIT Media Lab.<o:p></o:p></span></span></p> <h3><span style=""><span style="" lang="EN"><o:p> </o:p></span></span></h3> <span style=""></span> <p class="MsoNormal" style="text-align: justify;"><b>Copyright principles in a digital scientific world</b></p> <p class="MsoNormal" style="text-align: justify;"><b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;"><o:p> </o:p></span></b></p> <p class="MsoNormal" style="text-align: justify;"><b>Copyright</b> <b style="">Information</b></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;"><b>The nature of copyright</b></p> <p class="MsoNormal" style="text-align: justify;"><b>Copyright</b> is an exclusive right comparable with a property right and embracing moral rights and property rights. Hence, it constitutes a basic and human right which in most countries enjoys protection by constitutional law. <b>Copyright</b> protects the creators of literary works, of scientific and artistic works (text, music and pictures, but also databases and computer programs) as well as certain producers of cultural emanations (in particular performing artists, phonogram and film producers, broadcasting companies).</p> <p class="MsoNormal" style="text-align: justify;"><b>Copyright</b> guarantees creators and producers both control over and participation in the commercial exploitation of their protected works and achievements; in contrast with property in tangible objects, basically speaking creators have the right to permit or prohibit not only the first but also every additional exploitation of their works.</p> <p class="MsoNormal" style="text-align: justify;">Even before the <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> age the <b>copyright</b> industry generated approximately 5% of industrialized nations' gross national product (GNP); future digitization developments will give rise to a further increase in this</p> <p class="MsoNormal" style="text-align: justify;">percentage. Hence, <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> will gain considerably in significance as regards securing employment and the industrial future of our societies.</p> <p class="MsoNormal" style="text-align: justify;"><b><span style="background: rgb(160, 255, 255) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">Copyright Problems</span> in connection with <span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span> use of works (electronic publishing)</b></p> <p class="MsoNormal" style="text-align: justify;"><b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">Digital</span></b> technology enables protected works and achievements to be copied without any loss in time or quality; an additional problem is the vulnerability of <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> data regarding manipulation ('digipulation') by third parties. This leads to a considerable loss of control in data representing protected works and achievements that can be --- legally or illegally --- accessed by third parties. This loss of control is even greater as regards online media (the Internet, proprietary networks, intranets, etc.) than it is for off-line media (disks, DAT, CD-ROMS, DVD, etc.).</p> <p class="MsoNormal" style="text-align: justify;">Owing to the fact that the language of all national <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> acts is directed at analogue exploitation technologies, certain lacunae, and in numerous cases uncertainties, arise with respect to the exploitation in <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> form. The same applies at the international level, for global <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> networking is characterized</p> <p class="MsoNormal" style="text-align: justify;">by the ubiquity of the works fed into the Internet, yet a global <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> will not exist in the near future.</p> <p class="MsoNormal" style="text-align: justify;">Rather, <b><span style="background: rgb(160, 255, 255) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">problems</span></b> will continue to be regulated by a bundle of co-existing national <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> laws, giving rise to the necessity of worldwide harmonization as regards both substantive law and issues of applicable law, international jurisdiction as well as the effect, recognition and execution of national</p> <p class="MsoNormal" style="text-align: justify;">judgments in foreign countries.</p> <p class="MsoNormal" style="text-align: justify;"><b><o:p> </o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b>Interests involved</b></p> <p class="MsoNormal" style="text-align: justify;">From the perspective of rights owners, a loss in control and uncertainty in legal issues may well entail reductions in investment activities. On its part this could lead to an undesirable restraint regarding investments in the <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> infrastructure and in attractive <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> products. Another reason for such a restraint is the fact that at present the manner and extent of the replacement of analogue by <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b></p> <p class="MsoNormal" style="text-align: justify;">exploitation --- which will continue to co-exist --- cannot be foreseen with any degree of certainty.</p> <p class="MsoNormal" style="text-align: justify;">Moreover, there are divergences between the creators and producers as to the division of rights on the suppliers' side. Contrary to continental European traditions --- protecting the author as the original creator and weaker contracting party --- producers aim to acquire all the rights at once and on a centralized basis from the authors ('buy out' in a 'one-stop shop'). Furthermore, a distinction has to be made between 'scientific' and 'commercial' publications. As regards scientific publications, authors hardly need <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> as an incentive to continue their research activities. In addition, scientists aim to achieve the widest dissemination possible for their scientific findings; excluding possible readers, or allowing them access to scientific information only against payment of a fee, is just not what they want.</p> <p class="MsoNormal" style="text-align: justify;">However, it should not be overlooked that even as regards <b><span style="background: rgb(255, 102, 255) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">publishing</span></b> for scientific purposes, publishers are in need of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> in order to protect their added value. As regards purely commercial publications, such as textbooks, reference manuals, etc., it would seem that both scientific authors and their publishers are in need of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> protection.</p> <p class="MsoNormal" style="text-align: justify;">On the other side of the fence users of protected works and achievements fear that such a strengthening of legal protection would result in their gradual exclusion from enjoyment of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> works and that access even to unprotected information would be unduly blocked. Reference is made to the fact that the</p> <p class="MsoNormal" style="text-align: justify;">extension of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> protection would render a large number of acts that as yet do not require consent subject to the consent of the creator. Libraries in particular have joined the users' side, for in accordance with their present activity they wish to lend not only analogue books but also participate in <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital </span></b>information transmission; yet this means that they will become direct competitors of producers</p> <p class="MsoNormal" style="text-align: justify;">(publishers, but also authors and sellers of analogue material and of products in material form). The same holds true as regards independent information providers who make use of preliminary work undertaken by third parties.</p> <p class="MsoNormal" style="text-align: justify;">To a much greater extent than all other authors, scientists and researchers find themselves in a dual position: they depend on information controlled by third parties (and are therefore users of protected subject matter) before they can create their own scientific output (and thus become authors of protected subject matter). It may indeed be tempting for scientists to speak up against strong <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> protection in the <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> environment, since this would facilitate access to protected works. However, such an approach has its dangers, since --- although it may well suit the interests mainly of natural scientists --- it severely undermines the interests of researchers in the humanities, for whom the royalties generated by</p> <p class="MsoNormal" style="text-align: justify;">their publications are an indispensable source of income. A solution should not be sought in curtailing existing rights, but in drafting an appropriate, research-specific exception to broad exclusive rights, in improving rights management and in balancing opposing interests by appropriate contractual language.</p> <p class="MsoNormal" style="text-align: justify;"><b><o:p> </o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b><o:p> </o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b><o:p> </o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b><o:p> </o:p></b></p> <p class="MsoNormal" style="text-align: justify;"><b>Recommendations</b></p> <p class="MsoNormal" style="text-align: justify;"><o:p> </o:p></p> <p class="MsoNormal" style="text-align: justify;">Consequently, the following principles should be observed in order to attain adequate <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> protection.</p> <p class="MsoNormal" style="text-align: justify;">First, the legislature is called upon to remedy lacunae and uncertainties in national <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> acts and, at the international level, to further global harmonization of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> law. The conclusion of the TRIPs (Trade-Related Aspects of Intellectual Property Rights) agreement and of the two WIPO (World</p> <p class="MsoNormal" style="text-align: justify;">Intellectual Property Organization) treaties (WCT [WIPO <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">Copyright</span></b> Treaty], WPPT [WIPO Performances and Phonograms Treaty]) represents a first step in respect to substantive law. In this context, particular attention should be paid to attaining a balance of interests.</p> <p class="MsoNormal" style="text-align: justify;">Secondly, promotion of rights holders' initiatives with the aim of providing information on the ownership of rights in individual works, facilitating access to works while developing additional technical protection.</p> <p class="MsoNormal" style="text-align: justify;">Thirdly, it is the responsibility of practitioners to adjust <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> contracts to the changing technological situation in exploiting protected works and achievements. This includes the development and implementation of new models of centralized rights management in addition to the existing system of collective administration.</p> <p class="MsoNormal" style="text-align: justify;">These principles may further be described as follows. Contrary to prognoses to the contrary (e.g. Negroponte), <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> will prevail in the <b><span style="background: rgb(255, 153, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">digital</span></b> world as a vital instrument of cultural and economic control. There is no need for a fundamental new system of attributing rights on immaterial goods that are of such significance to commerce and society as a whole.</p> <p class="MsoNormal" style="text-align: justify;">Uncertainties regarding the application of current copyright laws should be resolved. In principle, <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> law should be strengthened and not undermined, for defective or a total lack of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright </span></b>protection means that necessary investments cannot be amortized and as a result will not be carried out.</p> <p class="MsoNormal" style="text-align: justify;">Without attractive products, the future development of the information society's infrastructure is endangered. However, this does not exclude the definition of well-balanced exceptions to the exclusive rights. It goes without saying that, as a rule, legislative language should avoid being technology-specific, and it should be open to changes regarding the economic relationships between the parties involved.</p> <p class="MsoNormal" style="text-align: justify;">Of course, the loss in control will only be compensated in part by strengthening <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> protection; over and above this the answer to the <b><span style="background: rgb(160, 255, 255) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">problems</span></b> <b><span style="background: rgb(153, 255, 153) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">posed</span></b> by new technologies must be sought precisely in these technologies ("the answer to the machine is in the machine"). There is, however, a certain danger</p> <p class="MsoNormal" style="text-align: justify;">that in the long run, access possibilities will be controlled by technical devices rather than by well - balanced <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> rules.</p> <p class="MsoNormal" style="text-align: justify;">Strengthening of legal protection and the demand for technical access, control and accounting mechanisms does not preclude the future co-existence of legally protected and 'unregulated' spheres (such as the Internet or scientific publications, where authors would not wish to exercise their exclusive <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b>). In addition, it should be remembered that unfettered access to information does not</p> <p class="MsoNormal" style="text-align: justify;">necessarily mean that this access will be free of charge.</p> <p class="MsoNormal" style="text-align: justify;">Finally, one should note that the necessity of global harmonization of laws caused by developments in technology restricts drastically the space for national regulatory policy. This applies not only to the field of <b><span style="background: rgb(255, 255, 102) none repeat scroll 0% 0%; -moz-background-clip: -moz-initial; -moz-background-origin: -moz-initial; -moz-background-inline-policy: -moz-initial;">copyright</span></b> law but to all legal matter affected by networking. The price to be paid for any attempt to</p> <p class="MsoNormal" style="text-align: justify;">uphold national legal particularities will be a decrease in international enforceability of rights.</p> <h3><o:p> </o:p></h3> Sumedhhttp://www.blogger.com/profile/11533458660230230361noreply@blogger.com0