Wednesday, May 16, 2012

Chapter 10

Chapter 10
ETHICS of IT ORGANIZATIONS

VIGNETTE
Problems With Suppliers

1. How can an organization ensure that all members of its supply chain will behave ethically?

     ANSWER : Your customers will always hold you responsible if your suppliers behave badly. First, create guidelines for your suppliers while the jargon-tastic term 'ethical supply chain management policy' makes us shudder, the idea behind term is very sound: create a list of guidelines for those involved in your supply chain to ensure at every point, suppliers are observing best practice. Second, look out for suppliers' credentials and last but not the least is waste making your supply chain ethical isn't all fair wages and eliminating child labour - how the chain deals with its waste equally important. ( http://www.smarta.com/advice/suppliers-and-trade/business-suppliers/three-ideas-make-your-supply-chain-more-ethical )

2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

     ANSWER : Partnership is based upon commitment, trust and continuous improvement. Marketing attempts to create an impression of a personal relationship to customers even if the supplier does not know the customers or even meet them. It is a pseudo-personal relationship, but, all the same, it could be an efficient one (Gummesson, 2002). Several employees from both the supplier and buyers side are involved in the relationship. They are involved in negotiation, communication, bargaining, the transfer of goods, services and money. Ethical issues and personal values always influence such transactions. ( http://www.huizenga.nova.edu/Jame/articles/supplier-customer-relationships.cfm )

CASE 3 : Manufacturers Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?

     ANSWER : Green computing is an excellent to save money through reduce the power consumption and to lessen their negative impact on the environment.

2. Which approach can yield greater benefits- building greener computers or implementing programs that change users' behavior so that they operate their computers in a more responsible manner? Explain your response.

     ANSWER : Both are the approach that will yield a greater benefits because according to what I read that if you build a greener computer we can able to save money through the reduce of power consumption. While the users also, they have to be responsible to conserve energy or to overused the electricity.

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.

     ANSWER : The best computer manufacturer is Dell. Dell is the number one green technology brand, recognized for its extensive recycling program, the top ranked attribute sought by IT buyers. HP, IBM and Microsoft were noted for their energy efficient products and use of sustainable materials, while Apple held its position in the top five for designing products that are perceived to have a green look and feel. ( http://www.treehugger.com/gadgets/it-buyers-rank-greenest-computer-companies.html )

Chapter 9

Chapter 9
SOCIAL NETWORKING

VIGNETTE
Twitter Emerges as News Source for Law Protesters

1. Many people question the value of Twitter's goal of helping people stay connected. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people organizations to add real value?

     ANSWER : Yes, the events in Iran illustrate the potential value to society on how they are connected to other people. They did not used the Twitter in a proper way. There are some social networking sites that will able to connect you in your friends, families and coworkers like Facebook, MySpace, Tagged and etc.

2. How trustworthy is the information one gleans from social network such as Twitter?

     ANSWER : Twitter is taking the world by storm, leaving Facebook and email in its wake. Industry analysts say that more than 2.25 million "tweets" - Titter messages - are now posted everyday worldwide. Tweets differ from email in two ways : they are public - anyone on Twitter can find and read them - and they are always short: a maximum of 140 characters long. Other Twitterers choose to " follow " your tweets and you, in turn, decide to follow theirs. This way, you can find out, for instance, that your friend is on a ski lift and your colleague needs feedback on a product idea. ( Tweets can contain links to other websites, documents or pictures. ) ( http://www.telegraph.co.uk/technology/twitter/4523494/How-to-Twitter-why-the-world-is-Twitter-crazy.html )

CASE 3 : Social Networking Disaster for Domino's

1. Some observers believe that if an organization does not respond  within the 24 hours, then the damage has been done- lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino's have reacted more effectively?

     ANSWER : The Domino's must have to train their employees well . They have to required the management to gather facts and figure out what happend before the incident.

2. Do you find it unusual that Domino's response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or Why not? Does Domino's use of the online media set a precedent for others to follow in the future?

     ANSWER : Domino's using online media than to printed press releases because it is easily to share and view to the people. I think, the Domino's president respond in a appropriate way to apologize for the initial repulsive of their business.

3. Identify three lessons that other companies could learn from Domino's experience.

     ANSWER : The bottom line for any business and the clear message from the Domino's Pizza experience is that listening to your customer pays. It is irrelevant whether you are a multi-billion dollar enterprise or a one-person business, your customer's perception of your product or service is the key to your success or failure. The lesson every businessperson can learn - without spending $75m - is that it's okay to make mistakes and get it wrong sometimes as long as you are honest enough and courageous enough to admit those mistakes and, even more importantly, are proactive in addressing them. Negative feedback and criticism can be profitable for your business if you handle it properly! ( http://www.evancarmichael.com/Sales/6271/What-Every-Business-can-Learn-from-Dominos-Pizza.html )

Chapter 8

Chapter 8
THE IMPACT of INFORMATION TECHNOLOGY on PRODUCTIVITY and QUALITY of LIFE

VIGNETTE
Western Cape Striving to Eliminate the Digital Divide

1. How important is access to ICT in children's education?

     ANSWER : Through the access in Information and Communication Technology in children's education, it will gain more knowledge in the students.

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

     ANSWER :The barriers that stands in the way of universal access to ICT for everyone who wants it is they cannot afford to buy their own personal computers and don't have access in the Internet.

CASE 3 : Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute of confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

     ANSWER : As human beings we are all valuable social entities whereby, through the force of morality, through implicitly forged covenants among us as individuals and between us and our governments, and through the natural rights we maintain as individuals and those we collectively surrender to the common good, it has been determined by nature, natural laws, and natural rights that human beings have the right, not the privilege to healthcare access. ( http://www.peh-med.com/content/2/1/2 )

2. Should healthcare organizations make major investments in telemedicine to provide improve services that only the wealthy can afford?

     ANSWER : No, the healthcare organizations must make a major investments in telemedicines to provide improved services not only for the wealthy persons but also for the poor. They must provide improved services that all of us can afford.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

     ANSWER : The disadvantage of telemedicine is that most of the patients cannot afford of this kind of healthcare. Because of this, people might choose to die or to wait until they die than to pay an expensive telemedicine.

Chapter 7

Chapter 7
SOFTWARE DEVELOPMENT


VIGNETTE
Boeing Dreamliner Faces a Few Bumps In The Road

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm's customers and suppliers unusual, or is it a common occurrence?

     ANSWER : Both, the example software problems holding up the introduction if a major new product and impact a firm's customers and suppliers unusual and it is common occurrence because software defect will cause a software system to be fail. The result of that is, it will affect your customers who trust in your product.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

     ANSWER : To reduce the negative consequences of software developments problems of the organization, they must have a software quality to which a software product meets the needs of its users and also the quality management focuses on defining, measuring, and refining the quality of development process and the products developed during its various stage.

CASE 3 : Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot's effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or Why not?

     ANSWER : They have to pass and certified their  software to Quality Assurance testing so that it cannot cause a damages if they will use it.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

     ANSWER :They have to test their software to avoid accidents.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

     ANSWER : They have to be sure about the safety-critical software on how it works. If it is reliable to use the software, then that is the time that you can use the software.

Chapter 6

Chapter 6
INTELLECTUAL PROPERTY


VIGNETTE
RIAA Fights Music Piracy

1. Is the RIAA's strong stand on copyright infringement helping or hurting the music recording industry?

     ANSWER : RIAA is helping to protect intellectual property rights and the First Amendment rights of artists, to perform research about the music industry and to monitor and review relevant laws, regulations and policies. ( http://en.wikipedia.org/wiki/Recording_Industry_Association_of_America )

2. Could an ISP's implementation and enforcement of the RIAA's multitier strategy have a negative impact on the ISP?

     ANSWER : Yes, because ISP is an organization that provide access to the Internet. The ISP must follow the RIAA because if the organization didn't follow, they will have a sanctions.

CASE 3 : Lotus v. Borland

1. Go to your school's computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities the differences in the "look and feel" of these two programs.

     ANSWER : Quattro Pro is a spreadsheet program developed by Borland and now sold by Corel, most often as part of Corel's WordPerfect Office suite. Historically, Quattro Pro used keyboard similar to Lotus 1-2-3. It is commonly said to have been the forst program to use tabbed sheets. Actually, Boeing Calc had tabbed sheets earlier. It currently runs under the Windows operating system. Quattro Pro avioded the 65,536 row by 256 column spreadsheet limitations inherent to pre-2007 versions of Microsoft Excel by allowing a maximum worksheet size of one million rows 18,276 columns. ( http://en.wikipedia.org/wiki/Quattro_Pro )

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

     ANSWER : Lotus sought to ban any program which had a compatible and menu structure. Program commands had not been considered to be covered before, but the commands of 1-2-3 were embedded in the words of the menu displayed on the screen. 1-2-3 won its case against Mosaic Software. However when they sued Borland over its Quattro Pro spreedsheet in Lotus v. Borland, the courts ruled that it was not a copyright violation to merely have a compatible command menu or language. ( http://en.wikipedia.org/wiki/Lotus_1-2-3 )

3. Assume that you are the manager of Borland's software development. With the benefit of hindsight, what different decisions would you have made Quattro?

     ANSWER : If I will be a manager of Borland's software manager, i will resign in my work because if you have a big income, they will wander where you get that money.

Chapter 5

Chapter 5
FREEDOM of SPEECH

VIGNETTE
Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

     ANSWER : Yes, sexting represent a form of expression that is protected by the First Amendment right because sending sexual messages, nude or seminude photos, or sexually explicit videos over a cell phone it will consider this as child pornography.

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment Rights?

     ANSWER :  The parents will guide always their children against the sexting. They must teach their children what is right and what is wrong.

CASE 3 : The Electronic Frontier Foundation ( EFF )

1. Visit the EFF Web site at www.eff.org and develop a list of its current "hot" issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF's position. Discuss whether you support this position and why.

     ANSWER :  No Backroom Deals to Regulate the Internet: Speak Out Against the Trans-Pacific Partnership! The Trans-Pacific Partnership is a trade agreement currently being negotiated by United States and eight countries. Like ACTA, the TPP is being negotiated in secret, and on a fast timetable. We don't know what's in the TPP IP chapter or even what the US trade representative is pushing for in this agreement. That worries us. Entertainment industry executives who are members of the Industry Advisory Committee will likely get to see the agreement drafts - again - but the rest of us will be kept in the dark unless we speak up now. ( https://action.eff.org/o/9042/p/dia/action/public/?action_KEY=8229 )

2. What reason might a form give for joining and supporting EFF?

     ANSWER : It provides funds for legal defense in court, presents amici curiae briefs, defends individuals and new technologies from what it considers baseless or misdirected legal threats, works to expose government malfeasance, provides guidance to the government and courts, organizes political action and mass mailings, supports some new technologies which it believes preserve personal freedoms, maintains a database and web sites of related news and information, monitors and challenges potential legislation that it believes would infringe on personal liberties and fair use, and solicits a list of what it considers patent abuses with intentions to defeat those that it considers without merit. ( http://en.wikipedia.org/wiki/Electronic_Frontier_Foundation )

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the form donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say?

     ANSWER : If that is good to the people who are using technology well, I will support this kind of organization.

Sunday, May 13, 2012

Chapter 4

Chapter 4
PRIVACY

VIGNETTE
Privacy Concerns Abound with New IRS Systems

1. What information about you is being held, who is holding it, and what is this information being used for?

     ANSWER : This information talks about the privacy of one person.

2. What measures being taken to safeguard this information, and what happens if it is inadvertently disclosed or deliberately stolen?

     ANSWER :  They must have strengthen their security for the information of a person. To avoid stolen data, the organization must keep their employees information.


CASE 3 : Is Google Watching You?

1. How does Google's business model use personal data?

     ANSWER : Google can tracks what the user does, what words the user enters in the search engine, what sites the user visits, and the time and date of these events. Google uses this information to fine - tune advertising to the user needs and preferences.

2. What do you think are the major privacy concerns raised by Google's business model and applications?

     ANSWER : I think, the major privacy concerns raised by Google's business model and applications is that the user personal information can be share to the others.

3. Do you think Google has taken adequate measures to protect its users' privacy? Explain your answer.

     ANSWER : Yes, because the Google take action of concerns of the users.

Chapter 3

CHAPTER 3
COMPUTER and INTERNET CRIME

VIGNETTE
Trading Scandal at Societe Generale


1.  Peter Gumble, European editor for Fortune Magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly-- and quitly--dismissed.... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who won't is by giving every youngster it hires a chance to show his mettle. That means allowing even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

     ANSWER : My reaction about Mr. Gumble's comment is that Kerviel is good of deleting and reentering unauthorized transactions without getting caught.

2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurax detected many suspicious transactions?

     ANSWER : The failure of SocGen's internal control system is their IT security is weak, they must verify all the data that individual traders entered into the system.


CASE 3: Whistle - Blower Divides IT Security Community

1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

     ANSWER : Mike Lynn was acted acted in a responsible manner because he discovered that it was possible to create a network worm that could propagate itself as it as it attacked and took control of routers across the Internet.

2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or Why not?

     ANSWER : No, because Lynn was just presented his discovery about the network worm and to inform the IT security professionals and the public about the danger.

3. Outline a more reasonable apporach toward communicating the flaw in the Cisco routers that would have led to the problem being promptly addressed without stirring up animosity smong the parties involved.

     ANSWER : A more reasonable approach toward communicating the flaw in the Cisco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved is that the flaw in the Internet operating system.

Tuesday, April 17, 2012

Chapter 1

Chapter 1




VIGNETTE
Dubious Method Used to Investigate Leaks by Hewlett - Packard Board Members

1. Which issue is more deisconcerting the fact that a board member leaked confidential imformation about the firm or the tactics used to investigate the leak? Defend your position.

     ANSWER : The fact that a board member leak confidential information about the firm and the tactics used to investigate the leak are both disconcerting. First, about the borad member he/she do not have to do such confidential information in public which is one article appeared on the technology web site CNET because the effect of this is, it could have a significant impact on the competitiveness of the company and impact of its share price. Second, is about the investigators their investigation methods are illegal because they used the Social Security of the HP directors, certain employees and nine journalists without the owner permission.

2. Can the use of pretexting to gain information ever be justified? Is it considered as legal under any circumstances?

     ANSWER : No, because pretexting is the use of false pretences or to gain access to the telephone records of HP directors, certain employees, and nine journalists. For me that is illegal, because they do not have to use the individuals Social Security numbers to impersonate those individuals in calls to the phone company with the goal of obtaining private phone records for their investigation. The investigators must ask the permission of the individuals to do such thing.

CASE 3 : Is There a Place for Ethics in IT?

1. Discuss how a CIO might handle Schrage's scenarios using the suggested process for ethical decision making presented in this chapter.

     ANSWER : A CIO might handle Schrage's scenarios using the suggested process for ethical decision making in the chapter is, he show to us how to make right decisions in an ethical way.
2. Discuss the possible short - term losses and long - term gains in implementing ethical solutions for each of Schrage's scenarios.
     ANSWER : The possible short term losses of this is to failed in high quality standards of the companies. They might losses anything if they cannot handle the company well. The possible long term gains in implamenting ethical solutions for each Schrage's scenarios is if they will do the right in ethical ways of their company they will a gain a lot.

3. Must businesses choose between good ethics and financial benefits? Explain your answer using Schrage's scenarios as example.

     ANSWER : In my own opinion, businesses must choose good ethics and financial benefits because if the company treat the staff in the right way.

Chapter 2

Chapter 2


VIGNETTE
IT Technicians Fired After Reporting Child Porn

1. What message is sent to IT workers by the actions of New York Law School and Collegis even if unrelated job performance issues justified their actions in firing Gross and Perry?

     ANSWER : The message  sent to IT workers by the actions of New York Law School and Collegis even if unrelated job-performance issues justified their action in firing Gross and Perry is they were placed on probation first after they reported finding the photos of Mr. Samuels. Gross rated as "fully competent plus" and Perry rated as "excellence", there was no reason to fired them. I think the school fired them about the issue of Mr. Samuels because this issue will affect the reputation of New York Law School.

2. Since the incident, a number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. Most of the laws state that a worker who reports such discovery is immune from criminal, civil, or administrarive liability. Failure to report such discovery can result in a fine, imprisonment, or both. Do you think such laws will encourage reporting? Why or Why not?

     ANSWER : Yes, if I found a child pornography while servicing equipment I will report it like Gross and Perry did. Because that is not right to have a photos of nude young girls in your files. If you are a real professional, you do not have to do such thing that will make you regret someday.

CASE 3 : When Certification Is Justified

1. How can organizations and vendors change their certifications programs to test for skills as well as core knowledge? What issues might this introduce?

     ANSWER : The organizations and vendors can change their certification programs to test for skills as well as core knowledge is to take the CISSP examination, like so many other IT certifications it is a multiple choice. Most of exams are presented in a multiple choice format. Employers and IT workers alike have begun to recognize limitations of these types of examinations. They want to ensure that examinees not only have core knowledge but also know how to use that knowledge- and a multiple choice exam, even six-hours, 250 questions exam like the CISSP.

2. What are the primary arguments against certification, and how can certifying bodies change their programs to overcome these shortcomings?

     ANSWER : The primary arguments certification that testable IT knowledge does not necessarily translate into IT quality work. Respondents explained that hardworking IT workers focus on skills and knowledge that are related to their current projects and they do not have time for certifications that will quickly become obsolete. A worker needs good communications and problem-solving skills as well as perseverance to get the job done well.

3. What are the benefits of certification? How might certification programs need to change in the future to better serve the needs of the IT community?

     ANSWER : The benefits of certification is indicates that a professional possesses a particular set of skill, knowledge, or abilities in the opinion of the certifying organization. Unlike licensing, which applies on to people and is required by law, certification can also apply to products and is generally voluntary. Certification programs might need to change in the future to better serve the needs of IT community and certifying bodies are beginning to adapt their programs to better fulfil the evolving needs for certification in IT.

Friday, April 13, 2012

What Takes To Be An IT Professional?

When we say professional, it comes to our mind that it is a person who enjoys considerable work autonomy, and is commonly engaged in creative and intellectually challenging work. It may also refer to a person having impressive competence in a particular activity. One of those main criteria of this, is a professional is an expert who is master in a specific field. ATTITUDE, CONCENTRATION, and EFFORT - these things are keys to being a professional and the things you can control as an Information Technology professional. ATTITUDE must conforming to the standards of skill, competence, or character normally expected of a properly qualified and experienced person in a work environment. We can never be truly professional unless we develop a sincere respect for - and healthy attitude toward - our clients. CONCENTRATION means knowing what to do at the right time. It is knowing the little things that make a difference, being in the right place at the right time, and knowing what to do and when to do it. EFFORT means getting their before someone else does and beating the competition. Effort and passion in your profession must go hand in hand.