Thursday, May 17, 2012

CHAPTER 10

VIGNETTE 
Problems with suppliers 

1.)How can an organization ensure that all members of its supply chain will behave ethically?

        and agile Supply Chain ... communicate its role to other departments in the company. Ensure that all Purchasing transactions are conducted ethically.(http://www.weegy.com)

2.)What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?


       Perhaps ethical responsibilities are only one fact of a wider range of responsibilities known as "social responsibilities". Whatever the precise distinction may be, business ethics and business social responsibility can both be said to constitute the philosophical foundation upon which the societal marketing concept is grounded.

Case

1.)How have green computing efforts lowered the total cost of computer ownership?

            As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. [ Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels. As an example, each node of Supermicro's SuperBlade? can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade? can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees.
(www.weegy.com)

2.)Which approach can yield greater benefits- building greener computers or implementing programs that change users' behavior so that they operate their computers in a more responsible manner? Explain your response.


        In my opinion implementing programs that change users? behavior so that they operate their computers in a more responsible manner is the best approach that can yield greater benefits , [ in the manner that such programs will definitely change the attitude of every individual in the working environment with regards to operational procedures of computers thus resulting to responsibility education to the manpower through green operation that will in turn minimize the green house effect to the whole world itself.(http://www.weegy.com)

3.)Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.


       Based on my research the nuoffer.com has the best green computing rating for currently computer manufacturer.

CHAPTER 9

VIGNETTE “Twitter Emerges As News Source For Iran Protesters” 

Questions To Consider:

1.) Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

        The value of social networking such as Twitter is an important means of expressing one's idea's and your opinions to a certain event's. The events in Iran illustrate the value of Twitter in the society. They use Twitter to declare that they were against and that they were planning to have a protest and rallies against the presidential election.

2.) How trustworthy is the information one gleans from social networks such as Twitter?

        Since, we get information and maybe facts in Twitter, for me, I can say that it's trustworthy enough. Because, its coming from the mind of a person and they’re answering the question “What are you doing?” Its a way also to know one's personal opinion and how they react about a situation.

CASE STUDY 

Discussions Questions:

1.) Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

        They should take an action as fast as they could and prove to all their customers that those were just a joke. But before taking an immediate action or response, they should know first what really happened and what's the issue is all about before making a conclusion and respond to this.

2.) Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
 
        I find it inappropriate because, yes they respond about their issue but it's not suitable that they response just through online media rather than printed press. Since, it's a usual way or practice that through printed press should we response, they should not just sue online media but also through releasing it in press. It's disrespectful for me to the part of their customers.

3.) Identify three lessons that other companies could learn from Domino’s experience.

        First, if having an issue or problem, the company should take an immediate action . Second, they should response not just only through online media but also via printed press. Lastly, employees or even the employers should be careful in doing things that might lead people to misinterpret or to have an issue that might cause your company to fall.

CHAPTER 8

VIGNETTE “Western Cape Striving To Eliminate the Digital Divide”

 
1. How important is access to ICT in children’s education?

             Children are less likely to be intimidated by, or afraid of ICT than are most adults. They often approach ICT with keenness and curiosity and thus, may quickly become adept at operating the technology. Therefore, if managed effectively, it may be seen as a suitable and motivating tool for teaching and learning


2. What are the barriers that stand in the way of universal access to ICT for everyone 
     who wants it?
             To be educated and make it as a good example to be assure that children also adopt knowledge as how they grow, developing the skills and finding a way to be progress in learning.

Case Study
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and poor in the United States?

             Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity...


2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

            They should be if they can handle various issues regards to developing telemedicine, and somehow only few certain people can afford it that may lead to closure of investment.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

           Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.

CHAPTER 7

VIGNETTE “Boeing Dreamliner Faces A Few Bumps in the Road”
Questions to Consider:
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
             Yes, because not all software products is 100 percent totally not damage some have defect.
 
2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
             In order to reduce negative consequence of the software development, insure that the quality is high and good performance. These are important factors on which customers make purchasing decisions.

Patriot Missile Failure
Discussion questions:

1.   With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life?  Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Seud?  Why or why not?
            To prevent some problems the first steps could have been taking during development of the Patriot software is checked carefully to avoid in danger and serious problems.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
            The U.S. military made in choosing to deploy the Patriot Missile to Israel and Saudi Arabia because in the desert they have a field area and far in accident.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
            There are many reasons why safety is very important. For example, how would you demonstrate that a system was absolutely safe? Even if it continued to operate without any threat to safety for several years, there may be no guarantee that it will not fail in the next 24 hours. Changes in the environment, hardware failures, untested modes in software systems can all work together to expose systems in ways that had not been done in a previous period of safe operation.

CHAPTER 6

Questions to Consider
1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

RIAA is strongly against piracy, which holds the issue of megaupload. And I think they contributed a big help to the music recording industry lead to a jump in legal purchases as customers will turn to original music uploads.

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
Both sides refer their institution that is related to internet services, but the ISP don’t look their selves to involved from those internet piracies they just provide and established a good internet connection, so there is no negative impact on the ISP from RIAA’s multitier strategy.

Lotus vs Borland

Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

       They have significant differences, Quattro Pro is a Freeware. Lotus 123 is a DOS-program. MS Excel is by far the best from the choices because the script languages like VB-Script is compatible and powerful.

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

             
In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?
              If given the privilege to be the manager of the Quattro and i already know that it is illegal, I will resign my employment even if I owned a large amount of income every month, from time to time that the company that you were working on will be facing an investigations in court you are assuredly obliged to face the court as a manager in your company and aside to face the court you will be put in prison.

CHAPTER 5

Vignette (Sexting)
Questions to Consider
  1. Does sexting represent a form of expression that is protected by the First Amendment?
            In these cases, there’s no legal recourse for anyone to take to stop that person. In the meantime, underage participants those who have the least life experience to help them make good decisions are being held accountable. Until we learn how to deal with this new phenomenon appropriately in homes, in schools, and in the courts, many teens and young adults will likely continue to get hurt.

  1. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?
            The right to freedom of expression is one of the most important rights for free people everywhere. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.


Cases
The Electronic Frontier Foundation (EEF)

Discussion Question
  1. Visit the EEF Web Site at www.eff.org and develop a list of its current “’hot” issues. Research one EEF issue that interest you, and write a brief paper summarizing EEF’s position. Discuss whether you support this position and why.



  1. What reasons might a firm give for joining and supporting EEF?
        EEF’s mission includes educating the press, policy makers and the general public about civil liberties. It provides an extensive collection of information on such issues as censorship, free expression, digital surveillance, encryption and privacy. Most of EEF’s annual operating budget comes from individual donations from concerned citizens. EEF also has relationship with many IT-related organizations that provide it with hardware, software, and IT services.

  1. The vice president of public affairs for you midsized telecommunications Equipment Company has suggested that the firm donate $10,000 in equipment and services to EEF and become a corporate sponsor. The CFO has asked if you, the CIO support this action. What would you say?
     If I am the CIO I will support the sponsors, hope to do a better job of minimizing the negative impacts of IT on society, help IT users become more responsible in fulfilling their role and responsibilities, and eventually build a more knowledgeable marketplace for their products.

Wednesday, May 2, 2012

CHAPTER 4 VIGNETTE “Privacy Concerns Abound with New IRS Systems”



1.)     What information about you is being held, who is holding it, and what is this onformation being used for?

Since, many individuals are paying federal taxes and file private information with the IRS annually. And IRS are collecting data that includes address, and names and also Social Security numbers and financial information. This is being the target also of the Identity Thieve. Theefore as a result, the federal government  has issued stringent security requirements for storing, accessing, and manipulating this data.

2.)     What measures are being taen to safeguard this information and what happens if it is inadvertently or deliberately stolen?

If the data collected by IRS are being stoln by the Identity Thieves and the funds or money that the IRS collected, this might disrupt the tax payment and processing of tax returns might affect the economy of the nation. That is why, federal government issued strict security requirements for accessing and manipulating data.

CASE STUDY #3 “Is Google Watching You?”

Discussions Questions

1.)     How does Google’s business model use personal data?

Google uses tis information to fine-tune advertising to the user’s needs and preferences. In this way, Google can target their clients advertisements to a very specific demographic within a population. It also stores information in a Google database.

2.)     What do you think are the major privacy concerns raised by Google’s business model and applications?

First, is that Google will share the ingormation it collects with other sources. Some critics fear what would happen if the government gained access to Google’s database. Second, Google contented that in handling this data, the company would be forced to reveal trade secrets regarding its search technology.

3.)     Do you think Google has taken adequate measures to protect its users privacy?

Im not satisfied to Google in protecting each user’s personal data or its privacy. Somehow, we may not know how long this Google database would store or protect our privacy inhandling our own data. I am not being secured and assured that Google can prevent against those people who would try to reveal or steal our data as a person.

CHAPTER 3 - COMPUTER AND INTERNET CRIME (Case Study)


VIGNETTE

Trading Scandal at Society General
Questions to Consider:

1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble? 
          My reaction to Mr.Gumble's statement is that it is true that some of the bank's today can tell who will turn into a good trader ad who won't is by giving every youngster it hires a chance to show his mettle. That means allowing even the most junior traders to take aggressive positions. this leeway must matched by careful controls of trading floors.
link:http://tradereducatoronline.com/page/3/

 2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?
           For me, the failure of SocGen's internal control system is lack of security detection for some malicious industrial spy, they will take advantage to steal money from the organization. 
link: http://www.ft.com/intl/cms/s/0/927fe998-d5b2-11dc-8b56-0000779fd2ac.html#axzz1tjfDVfVa


Whistle-Blower Divides IT Security Community

Discussion Questions and Answers:

1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?
             Yes, because he reveal some secret about capturing and hacking the CISCO Router, Lynn's planned about it to prevent the problem in the future. 
link: http://www.schneier.com/
2. Do you think that CISCO and ISS were right to pull the plug on Lynn's presentation at the black hat conference ? why and why not ?
             Yes, because if they pull the plug on Lynn's presentation this will be the beginning of having a security and protection for stealing the internet of the CISCO routers.
link: http://noisefilter.blogspot.com/2005/08/wired-news-router-flaw-is-ticking-bomb.html

3. Outline a more reasonable approach toward communicating the flaw in the CIsco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.

           It is nice to hear some recommendations of some researchers that discover those problems it may cause a good effect to the CISCO company to avoid problem being promptly addressed without stirring up animosity among the parties involved.
link: http://www.taosecurity.com/