Intellectual Assets Inventory October 8, 2014. Characters We’ve Met in Academia We share everything in my projects completely freely, Open Innovation.

Slides:



Advertisements
Similar presentations
Using Regional Pedagogical Communities to Improve STEM Learning Environments Facilitators: Marlene Moore Barbara Stebbins-Boaz Willamette University in.
Advertisements

CONCEPTUAL WEB-BASED FRAMEWORK IN AN INTERACTIVE VIRTUAL ENVIRONMENT FOR DISTANCE LEARNING Amal Oraifige, Graham Oakes, Anthony Felton, David Heesom, Kevin.
EuropeAid PARTICIPATORY SESSION 1: 3 topics Each table chooses its topic: o Managing reality (Blue) o Assessing performance (Yellow) o Monitoring & reporting.
DEVELOPMENT OF AN INNOVATION CENTER WIPO/INN/MCT/04/3 WIPO NATIONAL WORKSHOP ON INNOVATION SUPPORT SERVICES AND THEIR MANAGEMENT Muscat, April 20, 2004.
Dr Linda Allin Division of Sport Sciences The value of real life evaluation research for student learning and employability in Sports Development.
Mafijul Islam, PhD Software Systems, Electrical and Embedded Systems Advanced Technology & Research Research Issues in Computing Systems: An Automotive.
Department of Education, Employment and Workplace Relations
Innovation Strategy Design An Interactive Workshop for Research Groups.
© Copyright Custell Pty Ltd The Relationship Lifeblood: Leverage the Relationship Improve Intimacy Create Value Reduce cost Partnering for.
Development of Intellectual Property Policies at Universities and Research Centers Mr. Ryszard Frelek, Division for Certain Countries in Europe and Asia,
Principal Patent Analyst
Intellectual Property Rights Margaret Lawlor Business Development Manager Faculty of Medical Sciences 2015 copyright©NewcastleUniversity 2015.
Towards Better Exploitation and Economic Impact: Developing the EPSRC Partnership with the University Vince Osgood Associate Director, Economic Impact.
Capitalising the full potential of on-line collaboration for SME innovation support H2020-INNOSUP Context and Objectives Info-session Brussels,
PAXIS JOINT WORKSHOP SALAMANCA, June, 2005 New Strategies for Innovation Support PAXIS JOINT WORKSHOP.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Planning and Strategic Management
CATEGORIES OF INFORMATION There are three main categories of business information,and these are related to the purpose for which the information is utilized.
Chapter 2 Succeeding as a Systems Analyst
1 CCLI Proposal Writing Strategies Tim Fossum Program Director Division of Undergraduate Education National Science Foundation Vermont.
IT Planning.
1 IPSG WORKSHOP 1 - CHALLENGES AND TOOLS FOR THE CENTRE OF GOVERNMENT There is an observable trend towards direction of centralization of the CoG: Reasons.
Introduction to Systems Analysis and Design
Customer Focus Module Preview
1 IMC Planning Knowing the Score In IMC, a plan is similar to a musical score. The IMC plan details which marketing communications and media should be.
Y. Rong June 2008 Modified in Feb  Industrial leaders  Initiation of a project (any project)  Innovative way to do: NABC ◦ Need analysis ◦ Approach.
October 23, 2006 Manila, Philippines Ateneo de Naga University Alumni Association Re-building & Re-inventing for Service Driven Alumni Association Charlie.
SMEs Division National IP Action Plan for Entrepreneurs and SMEs March 2008 Small and Medium-Sized Enterprises Division World Intellectual Property Organization.
Joint Business Plan Madhurjya K. Dutta 1mk_dutta Sept 2010.
GOVERNANCE ELECTRONIC. ” “ E-Governance is the application of Information and Communication Technology (ICT) for delivering government services, exchange.
Dr. István Fekete: The Role of Integrated Risk Management in Organizations April11th, Budapest.
T HE SCSTI SUPPORT IN AREA OF RESEARCH, DEVELOPMENT AND TECHNOLOGY TRANSFER national project National infrastructure for technology transfer support in.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Internet 2 Corporate Value Proposition Stuart Kippelman (J&J) Jeff Lemmer (Ford) December 12, 2005.
Impact assessment framework
What is Enterprise Architecture?
System Planning- Preliminary investigation
Kristina Marsh Marketing Flexibility, LLC
Intellectual Property Rights (IPR) Helpdesk A presentation by Daniela Nolte.
Slide 1 Intermec together with partners have worked with Lawson to provide an advanced solution allowing mobile workers to communicate directly with the.
Market Health SOME CONCLUDING REMARKS. This project has received funding from the European Union’s Seventh Framework Programme for research, technological.
Integrating Security Design Into The Software Development Process For E-Commerce Systems By: M.T. Chan, L.F. Kwok (City University of Hong Kong)
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Technology Transfer and IP framework initiatives May 2011.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Lecture 7: Requirements Engineering
Business Process Change and Discrete-Event Simulation: Bridging the Gap Vlatka Hlupic Brunel University Centre for Re-engineering Business Processes (REBUS)
An Introduction to Software Engineering. Communication Systems.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
Copying distribution or use of the contents of this document is prohibited without written authorization from SafeHarbor Technology Corporation. Maximizing.
Intellectual Property Dr Laura Rush Business Development Manager Research Enterprise Services copyright©NewcastleUniversity 2015.
Kendall & KendallCopyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall4-1 Interactive Methods to collect Information Requirements Interviewing.
AN INTRODUCTION Managing Change in Healthcare IT Implementations Sherrilynne Fuller, Center for Public Health Informatics School of Public Health, University.
Chapter 27 The Engineering Design Process. Learning Objectives Describe the various factors that are changing the design process Discuss the steps in.
Marv Adams Chief Information Officer November 29, 2001.
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 2: Introduction to Object-Oriented Systems Analysis.
Intellectual Property Right Bernard Denis, DG-KTT.
PMC xx/xxxx Project Title & Project Code Presenter:
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Towards Decentralized Resource Allocation for Collaborative Peer- to-Peer Learning Environments Xavier Vilajosana, Daniel Lázaro and Joan Manuel Marquès.
Continual Service Improvement Methods & Techniques.
Chalmers University of Technology, Göteborg, Sweden, CDIO conference 2009 Lessons learned from developing and operating a large-scale project course.
1 Intellectual Property Rights David Worrall – Legal Department.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
INTRO. To I.T Razan N. AlShihabi
What can we expect from the lawyers ?
Director Department for Transition and Developed Countries
Chalmers Innovationskontor
Design Model Like a Pyramid Component Level Design i n t e r f a c d s
What can we expect from the lawyers ?
Presentation transcript:

Intellectual Assets Inventory October 8, 2014

Characters We’ve Met in Academia We share everything in my projects completely freely, Open Innovation you know. I don’t need to think about IP and stuff like that, because I’m not interested in money. Do you have a business idea we can create the new Google from? Something patentable? Protecting your IPR is important, says the VCs.

Something in Between is Needed How about starting with listing what assets we have, then we can decide what to do with them!

A Lot of Interest in Sweden! 14 sessions during More than 200 participants from almost all innovation offices A follow-up workshop is in the planning

On the Agenda Today Utilisation of research Assets and Properties Exercises IAI Bingo Examples of Intellectual Assets Inventories Exercise: Spot the asset The IAI Tool and how to use it Exercise: Planning an IAI Summary and Next Step

Utilisation of Research and Intellectual Assets

Venture Creation Commercial Licensing University Market € € € € ”Ideas” ”IP” University Technology Transfer the Traditional Way

Paradigm Shifts in Innovation Management in Academia Inventions Commercialisation – Licensing – Venture Creation Science and Technology Entrepreneur Cherry-picking Revenue stream back to the university All kinds of intellectual assets Various ways to utilisation All research areas All kinds of roles in the innovation process Iterative ROI in terms of stronger position for researcher and university through impact on society Old Paradigm: Funnel (Money) New Paradigm: Megaphone (Impact)

Any Ideas or Patents Around? Sorry, no ideas or inventions at the moment, too busy interpreting the data I got from the computer algorithm I wrote that runs the measuring equipment I designed during lunch break

Inventions Software Methods Data Designs Models Perhaps No Ideas,… But Many Intellectual Assets

IDEA Deconstructing the ”Idea”

IDEA Deconstructing the ”Idea” ”People who want it to happen.” ”A utility and a way to realise it.” ”Knowledge that is necessary to create the utility” INTELLECTUAL ASSETS

Innovation process What is our role and responsibility? What is being utilised? How do we utilise? Research-based knowledge Value and benefit in society ! ! ? ? IMPACT

Venture Creation Research Collaboration University Society Clusters & Open Innovation Clusters & Open Innovation Education Licensing Intellectual assets

Best Way To Utilisation? Invention, model, data & method License it to one or several companies Start a consulting company that provides both goods and services Publish everything on the Internet using a Creative Commons license Create a community and invite to crowdsourcing, use in education Start a company that sells the invention and provide data and method for free on the web Write a textbook and sell it through a publishing company, develop a commissioned course ???

”Tools of the Trade” IAV Intellectual Asset Verification F2R Freedom2Research URA Utilization Role Analysis Innovation Strategy Design IAI Intellectual Assets Inventory What responsibility? What can we utilize?How can we utilize? R 3 Research Resilience Review

Assets and Properties

Assets in a Research Group Financial Grants Awards … Tangible Material Instruments … Intangible People Relations Intellectual assets … Do you know what assets you have and how to use them to reach your goals?

INTANGIBLE ASSETS Human resources – ”Who and what we are.” Relational assets – ”Who we know and how we are known.” Intellectual assets – ”Things we know and can transfer.” Today’s focus!

What is an ”Intellectual Asset”? Def. ”An objectifiable intangible asset.” ”Knowledge” Idea Solution Know-how … Defined Documented Transferable Intellectual assets form the basis for intellectual property!

Ver: A Ideas, solutions etc. codified as: Manuscripts Documentation Data … Model Data Set Design Invention Method Software Patent Copyright Trade Mark Open source license Creative Commons license …

Intellectual Property Intellectual Assets Knowledge & Know-How

Why Transform Human Assets to Intellectual Assets? Takes one day each time Reaches 20 people each time Only I can do it Interferes with other work Took some time to develop Have reached > people Does not require my presence Does not interfere with other work Leverage!

Example: Giving Away Model, Method & Design and Gaining Data Intellectual Assets: – Model for Leadership Development – Design for questionnaire – Method for improvement – Data from <10 companies Challenges – Commercialisation no-no – Too little time to Gather more data Spread the approach Licence the IA package (model, method, design) for free Get data in return Benefits – Get more data – Do more research – Keep reputation in research community – Create change in society TodayOpportunity

Categories of Intellectual Assets Invention Data Set Method Software Model Design

Most common & often go together Very rare! Often combined with model/method More common than you think

Exercise: IAI Bingo

IAI Bingo Listen to the story. When you hear an intellectual asset that has not been mentioned before, put a mark in a square below indicating the category the asset belongs to. When you have four (4) marks in a row (vertically, horizontally or diagonally) shout BINGO!

Shift From Looking for Buildings…

…To Seeing Elements…

…Because Somebody May Put Them Together in an Unexpected Way

IAI Examples

Ways to Use an IAI PhD students Researchers Research groups Centers (Companies) Research projects – Application for funding – Start of project – During project – Project end – Reporting Strategic development Competence development Communication Target groupsSituation Reactive vs Proactive Reactive vs Proactive

How We Have Used IAI Research centre (SUMO) Research program (SSF) Research-Based Verification – Database – Marine Textbook – Mentor4Research PhD Course (Research Utilisation) Extensive IAI in KMP (University of Gothenburg)

Example: The SUMO Center Type# Invention13 Model13 Method38 Software9 Data22 Design2 1 1 Asset types Strategic importance For material design: Descriptive or predictive asset

Example: IAI as Way to Report to Funding Agencies In addition to traditional reports, SSF projects are requested to add an IAI each year in the following programs: Software Intensive Systems, Data Intensive Systems PhD Students do workshops, where they present IA and design verification ideas

From an SSF Project

FORTES: Fault-Tolerant and Secure Automotive Embedded Systems ”The vision of the project was to push forward the current state of the art in automotive embedded system design so that design trade-offs related to timing, cost, reliability and security can be made in a systematic and integrated manner. Three concrete objectives were set up from the beginning: (1)development of software-based fault tolerance techniques for handling transient faults in embedded systems under strict timing and quality-of-service constraint and the integration of these techniques in a design optimization framework; (2)development of security aware techniques to prevent the introduction of security vulnerabilities in automotive software and to address security failures at run- time by developing mechanisms to detect and handle them; and (3)development of a flexible middleware layer that is responsible for resource allocation and handles tasks generated as a response to detected faults, security threats, and potentially unexpected processor and bus loads at run-time.”

FORTES: Fault-Tolerant and Secure Automotive Embedded Systems Described in terms of intellectual assets Methods: 1.technique to combine hardware and software fault tolerance techniques 2.technique to generate fault-tolerant message schedules on the time- triggered (static) segment of the FlexRay bus 3.frame packing method 4.technique for optimization of assertion placement in time-constrained hardware/software modules for detection of errors due to transient faults 5.a new method for detecting the presence of security vulnerabilities by detecting evidence of their causes in execution traces 6.integrated security consideration in Scrum, and developed Secure Scrum 7.a state- based intrusion detection scheme (IDS) for monitoring the security state of an automotive system 8.a technique to search for the best system-affordable cryptographic protection for the messages transmitted over the internal communication bus Software: 9.a prototype taint tracing tool has been designed for x86 Linux systems 10.a run-time environment to support reliable execution of distributed automotive control applications 11.a simulator implemented on top of the SystemC discrete-event simulation kernel Data

Example: Database Database: How companies deal with their purchase of transport services …. Result from a questionnaire study …. Aim to increased the efficiency in transport services

Continued Hypothesis for increased utilisation (possibilities): Route for the verification project

Example: Marine Textbook The Department of Shipping and Marine Technology had identified the need for educational material on Marine Environment. “We can write a textbook” – but what should we write about? An IAI was made to find what assets from the departments research that could be included. This formed the basis of a market survey and analysis that would help to determine content and packaging.

Example: Mentor4Research Each researcher-mentor pair worked on developing a utilisation hypothesis, starting with identifying the intellectual assets

Example: PhD Course PhD Course at Chalmers: Research Utilisation, 3 CTR Students work with their own research Learn how to use 6 tools:

Example: Knowledge Management Platform (University of Gothenburg) Doing a more extensive IAI as part of research and innovation strategy development

Exercise: Spot the Asset

Spot the Asset Spend 5 minutes on reading through the project report. Mark each intellectual asset you find. Think about if it is – background (developed prior to the project) or – foreground (developed within the project) Spend 10 minutes on discussing in pairs if you spotted the same assets and categorise them the same way. Fotograf: Johan Wingborg Invention Model Design Software Method Data Fotograf: Johan Wingborg

The IAI Tool

Principles for the Design of IAI 1.It should create an inventory that can be continuously updated and assessed in a research group. 2.Use of the tool should create immediate value for the individual researcher. 3.The inventory should give traceability in the intellectual assets. 4.The tool should require a small work effort and a small support effort. 5.The tool should allow large-scale deployment in a research organisation. 6.The goal is not to identify all intellectual assets.

IAI Components A Taxonomy of assets D Long-term process D Long-term process C Inventory method- ology C Inventory method- ology B Inventory structure

A: Taxonomy of Assets A A D D C C B B

Model A systematisation or taxonomy that can be used for description or analysis. statistical model, model organism, taxonomy for species, taxonomy for learning styles, conceptual model, theory and limitations or boundary conditions, computer architecture… DefinitionExamples Canine JackalFoxDog Wolf Invention Data Set Method Software Model Design

Method A structured, well-defined way of working that creates a relationship between a set of inputs and a well-defined result, and that can be described in one or more deterministic sub- steps. a way of working to gather data, a method for extracting substances, a production method, an algorithm, a method for cooperation, a process for managing materials or equipment, a teaching method, an advisory method, a way of setting up a test… DefinitionExamples Mix dry stuff Add eggs Stir a lot Invention Data Set Method Software Model Design

Data Set A set of related data points. survey results, measurements from sensors, interview answers, results from different experiments, simulation data, patient data, literature compilation… DefinitionExamples Invention Data Set Method Software Model Design

Invention Device or method to solve a given problem. material, algorithm, tool, instrument, cell-line, animal strain… DefinitionExamples Invention Data Set Method Software Model Design

Software program made for analysis of data, simulation, control systems, benchmarking systems… DefinitionExamples Invention Data Set Method Software Model Design

A construction that can be represented or described by for example a drawing or other visualisation. shaping of a keel for a boat, pattern for a fabric, artwork, music, sheet profile, user interface, programming language… DefinitionExamples Lena’s rug pattern Invention Data Set Method Software Model Design

Design Asset: Business Model Canvas

B: Inventory Structure Name Owner UtilisationType Description Relation Confidentiality! A A D D C C B B

C:Inventory Methodology 1. Setting2. Identification3. Characterisation4. Utilisation5. Conclusion – Next step A A D D C C B B

1. Setting Individual Scope and method No confidential material Construct the asset list Group Send out information No confidential material Construct the asset list in a way everyone can see it.

A. Start with recapping the projects purpose and goal. B. At the start of the project, which key resources existed already in terms of intellectual assets? (background) C. During the project, which new assets were created? Work with the timeline and identify events that generated new assets. 2. Identification

3. Characterisation Look for connections! Who is the owner? Make a hypothesis for utilisation. Start to think about IP. Foot length Height Data Laser SEM Method Shoe size = k/  * Foot length Model

4. Utilisation Choose the assets that you want to actively work with. Are there any assets that are relatively easy to utilise? How? Who should do what and when? Speak with your innovation advisor about opportunities for financing for verification of these assets

5. Conclusion – Next step Who does what until when? Next meeting? Next IAI update?

IAI IAV (Intellectual Asset Verification) IAI Manuscript Application Report Publication Inventory IAV D: Long-term Process A A D D C C B B

Exercise: Planning an IAI

Group Task Plan doing an IAI for a real group/researcher at your university Pick one application situation – Introduction to Utilisation for Research Group – Application for funding – Strategic development of research centre Discuss the following issues: – How will you approach the group/researcher? – What benefits can you see? For the researcher(s) and for you? – How will you do the IAI? Who does what? – What will be your next step after the IAI? Present you ideas to the other groups But first: Listen to some examples

Example: Introducing Utilisation to a Research Group In less than 20 minutes, the group identified >70 intellectual assets! Wow!

Example: Applying for Funding Bio Economy – Life Science Engineering – There were clear research assets brought by partners – Packaging and story telling was a part of the application – In order to clarify background of partners, the project (if funded) will start with IAI of all participants – To facilitate future utilization, IAI will be used recurrently

Background & Foreground Method Alfa Method Beta Method Omega Database 1a Database 1b Database 2 Invention Q PROJECT X, 2012 Agreement 34XC Partners A, E, F PROJECT XX, 2013 Agreement 54PF Partners F, G, P Method Beta2 Database 2b Invention Y No, we didn’t bring anything into the project but started from scratch!

Example: Strategic Development of Research Center Medtech West is a joint centre for clinically oriented research on medical technologies Researchers from different universities collaborate on developing new technologies that will solve medical needs. IAI has been used to clarify ownership and funding of assets; to prioritize among projects for further development and to facilitate reporting and communication

Group Task Plan doing an IAI for a real group/researcher at your university Pick one application situation – Introduction to Utilisation for Research Group – Application for funding – Strategic development of research centre Discuss the following issues: – How will you approach the group/researcher? – What benefits can you see? For the researcher(s) and for you? – How will you do the IAI? Who does what? – What will be your next step after the IAI? Present you ideas to the other groups But first: Listen to some examples

Next Steps

IAI Support Material IAI Template (Excel) Swedish, English IAI Guidelines (pdf) – Swedish, English IAI 2-pages (pdf) – English Presentation material from today (pdf) Swenglish

Next step For us: – with IAI Support Material – Contact within a month or so: evaluation – ERFA-meeting Suggestions for you: – Do an IAI with for example a PhD student – Make a strategy for how to introduce IAI and integrate it into current practice – Discuss implications with university management