scholarly journals Study on the various intellectual property management strategies used and implemented by ICT firms for business intelligence

2019 ◽  
Vol 9 (2) ◽  
Author(s):  
Shabib-Ahmed Shaikha ◽  
Tarun Kumar Singhalb

Software technology is seeing enormous growth as it is used in all fields of technology. It is continuously evolving at a rapid pace and has a short span of the technological life cycle. The use of the software is not restricted only to information and communication technology but is used in all fields of technology. In many cases, the inventive step of a product or service lies solely in the software. Hence, the software plays a crucial role in all fields of technology. However, ease of copying poses a financial risk for the software industry, thereby creating major disincentives to the development of innovation. Still, the technology is changing very fast and firms investing in this technology expect quick returns on their innovation investments. Strategies for generating and managing intellectual property have subsequently taken center stage for information and communication technology companies, and patents have become an important feature providing maximum protection for any technology. Hence, intellectual property rights strategies in general and patenting strategies especially play a crucial role in the information and communication technology industry to be globally competitive. Firms never publish or disclose their intellectual property strategies; hence, this study makes use of the literature review to highlight various intellectual property management strategies used by information and communication technology firms for managing their intellectual property. These strategies can be offensive or defensive and may be used as proactive or reactive depending on various aspects such as market, territory, technology, or time. The insights provided in this work may help the research community from the IT domain in industry and academia to learn and modify their strategies for patent acquisition.

2016 ◽  
Vol 39 (3) ◽  
pp. 602-621 ◽  
Author(s):  
Elizabeth Babskie ◽  
Aaron Metzger

The current study investigated associations among adolescents’ reports of harmfulness and family decision-making beliefs regarding potentially problematic cyber behaviors (e.g., talking to strangers online), cyber-specific information management strategies (disclosure, secrecy, concealment), and family rules regarding adolescents’ use of information and communication technology (ICT). The sample consisted of 159 adolescents aged 12 to 18 years ( M = 14.45, SD = 1.72, 59% female, 80% Caucasian). Youth were more likely to disclose their ICT behavior when they recognized the harm associated with cyber risks and viewed their family as less restrictive about ICT activities. Age differences indicated that older adolescents’ ICT beliefs were more strongly related to their information management strategies, whereas families’ ICT rules were more predictive of cyber disclosure for younger adolescents. Results demonstrate that both adolescents’ conceptualization of ICT risks and families’ ICT-specific rules contribute to adolescents’ choice of information management strategies regarding ICT behaviors.


2019 ◽  
Vol 13 (1) ◽  
pp. 49-63
Author(s):  
Syufa'at Syufa'at

Copyright is one part of intellectual property that has the widest scope of protected objects. The rapid development of information and communication technology requires rules that support copyright, especially with the rampant piracies. Therefore, copyright must have a legal protection as other rights. This paper is dedicated to outlining the concept of piracy of works in the field of copyright using an integrated review of Islamic law and the Indonesian Law No. 28 of 2014 concerning Copyright. By using a deductive framework and normative approach, this paper formulates one finding that copyright piracy even though there are no clear and standard rules in Islamic law, by using analogy (qiyās) method, the copyright rule is in accordance with the law against the perpetrator of theft (saraqah). However, because a pirator of copyrights is not the same as a theft, its rule enters ta’zīr domain where all provisions for sanctions are determined by the government. In Indonesia, the actualization of sanctions is regulated in Law No. 28 of 2014, which essentially strives to create justice and guarantee of every individual right that leads to widespread benefit. Islamic law (in this case saraqah rules) becomes the theological basis for Law No. 28 of 2014 in a normativity context, where the integration points of Islamic law and Indonesian law can be established.


2008 ◽  
Vol 38 (3) ◽  
pp. 316
Author(s):  
Wenny Setiawati

AbstrakThis paper abserves the development in the discussion of e-commerce as across cutting issue in WTO and how the issue affected Indonesia primarily inthe information and communication technology (ICT) area. The explorationwill focus on e-commerce discussion and the progress starting from the FirstMinisterial Conference to the Fifth. The observation will also broaden to allrelated issue of the topic in this research, such as intellectual property rightsand ICT Under the author analysis, there is one thing that Indonesiangovernment can take advantage, the joining in Information TechnologyAgreement (ITA). Because ITA was, establish in the purpose of encouragingnations to develop their ICT so there will be development in the ICT in orderto create of fair competition. The encouragements were given in the form ofreducing custom and duties on technology used for ICT More authoropinion that Indonesia must see ITA as the facility in building up the ICT inthe country, despite the debate on the categorization of e-commerce, whetheras good or service. Indonesia must take an immediate step redeem necessaryto compete in the globalization of commerce, and maximizing the ICTdevelopment through available facility is one possible step right now.


Sign in / Sign up

Export Citation Format

Share Document