Lunes, Mayo 14, 2012

Case Study: Chapter 10


Questions to consider:


1.     How can an organization ensure that all the members of its supply chain will behave ethically?
Answer:
  1. Do no harm. This means consciously avoiding harmful actions or omissions by embodying high ethical standards and adhering to all applicable laws and regulations in the choices we make.
  2. Foster trust in the marketing system. This means striving for good faith and fair dealing so as to contribute toward the efficacy of the exchange process as well as avoiding deception in product design, pricing, communication, and delivery of distribution.
  3. Embrace ethical values. This means building relationships and enhancing consumer confidence in the integrity of marketing by affirming these core values: honesty, responsibility, fairness, respect, transparency and citizenship.
    link: wikipedia.org

2.     What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
Answer:
Multi-national corporations (MNCs) have been criticized for not behaving ethically in some situations. This study examines the ethics of a large MNC in its relationship with its suppliers. A brief literature review of social responsibility, business ethics and relations is undertaken. The views and perceptions of the buying staff and the suppliers to a large South African MNC are obtained and discussed. The results indicate that this MNC is well perceived by both suppliers and their own buying department. The existence and implementation of formal codes of ethics was found to be a necessary but not sufficient condition for good ethical practice. Candid relationships with suppliers emerged as a second and important factor.

link: http://www.huizenga.nova.edu/Jame/articles/supplier-customer-relationships.cfm

 Discussion questions:


1.     How have green computing efforts lowered the total cost of computer ownership?
Answer:
The goals of green computing are similar to green chemistry; reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclable or biodegradability of defunct products and factory waste. Research continues into key areas such as making the use of computers as energy-efficient as possible, and designing algorithms and systems for efficiency-related computer technologies.

link: http://www.weegy.com/?ConversationId=0B0F4D19


2.     Which approach can yield greater benefits-building greener computers or implementing programs that change users’ behavior so they operate their computers in a more responsible manner?  Explain your response.
Answer:
In today’s’ climate, it is difficult to ignore the ongoing concerns about climate change and the environment and whereas there appear to be no easy solutions for businesses, the IT community can have a significant impact on the worldwide carbon footprint 
by adopting a ‘greener’ approach to computing .Green computing is rising energy costs and potential savings. Energy to manufacture, store, operate, and cool computing systems has grown significantly  in the recent years, primarily due to the volume of systems and computing that companies now heavily rely upon.

3.     Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.
Answer:

Hewlett Packard

In recent years, Hewlett Packard has introduced many Energy Star qualified computers onto the market, including several that have won high EPEAT ratings. For example, the HP EliteBook 2530p notebook computer is Energy Star 5.0 qualified and has earned EPEAT gold. Also, Hewlett Packard has qualified for the Environmental Protection Agency's SmartWay label, which is applied to products and services with reduced transportation emissions. HP is striving to use more recycled materials in its products and product packaging. HP has also instituted buy back and recycling programs for all brands of computers, monitors, printers, scanners and other computer technology. HP has its own huge recycling facility in Roseville, California which processes about 4 million pounds of electronics per month.

link: http://www.brighthub.com/environment/green-computing/articles/61813.aspx

Case Study: Chapter 9


Questions to consider:


1.     Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
Answer:
Twitter enables users to send or read text-based posts. Twitter can be helpful or it could  be harmful, it depends on how you will use it.The best way to add real value is to keep your eyes open and improve as many things as possible. Figure out how you can help the situation or connect with people who can. You have to know what you are involved in, inside and out, so you’re ready when an opportunity presents itself.


2.     How trustworthy is the information one gleans from social networks such as Twitter?
Answer:
There has been some interesting debate on the credibility of twitter as perceived in the eyes of users. According to a recent study by the Association for Education in Journalism, entitled: A little bird told me, so I didn't believe it: Twitter, credibility, and issue perceptions, twitter isn’t doing well in the trustworthy stakes when it comes to news.


In the survey they established that twitter was the one source of news that people were the least likely to trust. Even when the actual tweets came from a reliable news service! This is fascinating stuff. I mean, you can see why people could have problems believing in what twitter has to say, can’t you?


link: 
http://www.techinstyle.tv/2010069492/uncategorized/is-twitter-trustworthy/ 




 Discussions question:


1.     Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
Answer:
Consumers must take in mind the brands that are not effective in order to avoid further fraud.


2.     Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
Answer:
Online media has a very big role in  influencing people than printed press. Online media could post  images, videos or even a message in an instant which print press couldn't. by the use of these, people could see factual or unreal information that would spread worldwide.

3.     Identify three lessons that other companies could learn from Domino’s experience.
Answer:


Case Study: Chapter 8


Questions to consider:


1.     How important is access to ICT in children’s education?
Answer:
Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners.
 


2.     What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
Answer:
the barriers that stand in the way of universal access to ICT for everyone may be the lack of resources that allows the availability of the ICT.

Discussion questions:
1.Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Answer:
I’m not surprised if you didn’t know that because we have been silent about this problem for too long. However, there are a lot of myths and stereotypes about the poor people in this country that need to be debunked before any changes can be made.

        2.) Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?
Answer:
As the health care system continues to change and adapt to the new realities associated with finance and management restructuring, the technological side of patient care also has changed. Telemedicine is a new word found in the constantly changing vocabulary of the American health care system.

 link: http://www.pujari.com/telemedicine/telemedicinedetails.html


3.) What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?
Answer: 
Drawbacks of telemedicines are that they can be expensive and may or may not be completely covered by every insurer. Demand of telemedicine is pretty high as well. Situations where telemedicine might not be useful might be to the elderly.

Case Study: Chapter 7


Questions to Consider:

1.) Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Answer: 

Its the risk of buyers to buy defective products/softwares. Its as they say "Buy at Your own risk".


2.) What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:
Organizations must ensure the quality of their products. Quality Assurance must be top of their priority list, and the welfare of the Consumers.

Discussion questions:

1.)   With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life?  Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Seud?  Why or why not?
Answer:
they should have assured evrything first. They wouldn't have had any casualties.

2.) What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
Answer:
The probability that people will get hurt maybe less, that may be the reason they chose to test their patriot missiles to deploy to the places mentioned.


3.) What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Answer:
 Customizable Professional IT Regression Testing Plan.

Case Study: Chapter 6


Questions to consider:

1.)  Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?
Answer:
The Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies. Its members are the music labels that comprise the most vibrant record industry in the world. RIAA® members create, manufacture and/or distribute approximately 85% of all legitimate recorded music produced and sold in the United States.
In support of this mission, the RIAA works to protect the intellectual property and First Amendment rights of artists and music labels; conduct consumer, industry and technical research; and monitor and review state and federal laws, regulations and policies. The RIAA® also certifies Gold®, Platinum®, Multi-Platinum™ and Diamond sales awards as well as Los Premios De Oro y Platino™, an award celebrating Latin music sales.
 


2.)  Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
Answer:
There are still many things to work on Though the RIAA says the music industry has fully embraced the Internet as a major channel for distribution to consumers, the group has called on the Federal Communications Commission to endorse efforts to curb illegal downloads of copyrighted works. This infact will largely affect their industry.


Discussion questions:
1.Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs.  Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.
Answer:
Graphs in a spreadsheet program such as Lotus 1-2-3 and Quattro Pro are similar to what we call graphs in math class. In Microsoft Excel they called charts.

Graphs then, are visual representations of worksheet data. Graphs often makes it easier to understand the data in a worksheet because users can easily pick out patterns and trends illustrated in the graph that are otherwise difficult to see.

Different types of graphs serve different purposes.

Pie Graphs -- are used to show percentages. For example, a pie graph could be used to show what percentage of your total daily calorie intake is represented by one quadruple cheese and bacon hamburger.

Bar Graphs -- are used to show comparisons between items of data. Each column in the graph represents the value of one item of data. An example of this would be to compare the calories in a quadruple cheese and bacon hamburger with the calories in a glass of water and a bowl of beet greens.

Line Graphs -- are used to show trends over time. Each line in the graph shows the changes in the value of one item of data. For example you could show changes in the values of three different stocks over a period of months.


2.) The courts took several years to reverse their initial decision and rule in favor of Borland.  What impact did this delay have on the software industry?  How might things have been different if Borland had received an initial favorable ruling?
Answer:
In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement. This would very catastrophic.


3.) Assume that you are the manager of Borland’s software development.  With the benefit of hindsight, what different decisions would you have made about Quattro?
Answer:
If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an invistagetion in court you are assuredly obliged to face the court as a managerin your company and aside to face the court you will be put in prison.

Case Study: Chapter 5



Questions to consider:

1) Does sexting represent a form of expression that is protected by the First Amendment?
Answer:  
According to Lawbrain.com, sexting is the sending of suggestive material, such as photos or sexual jokes, through text messages. And a charge of child pornography can include the production, distribution and possession of photos of minors engaging in sexually explicit conduct.  It is not, of course, protected by the First Amendment.
In a study commissioned by the National Campaign to Prevent Teen and Unplanned Pregnancy and CosmoGirl.com, sexting really is prevalent among teens and young adults. It showed that "20 percent of teens, 13 to 19 years of age, have either sent or posted nude or semi-nude pictures or videos of themselves, and of their older counterpart, 20 to 26 years of age, 33 percent have sent or posted nude or semi-nude pictures or videos of themselves."


2) What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 
Answer:
The House Judiciary Committee voted 5 -3 on April 8, on the bill regarding minors using cell phones and other electronic devices to send and/or receive pictures that include nudity.  Although under current Arizona law, a teen can be arrested for felony sexual exploitation of a minor, Arizona Attorney General and some prosecutors don’t think the punishment is what it should be.  Senate Bill 1266 proposes that juveniles would be charged with a misdemeanor.  According to azcentral.com, “some committee members say the new law is still too harsh and could be applied unevenly across the state.”
Arizona State legislature wants to crack down on teens’ inappropriate sharing of sexually explicit photos. In other words, they are working to put a ban on what is commonly known as "sexting".

link:http://mpjournalism.wordpress.com/2010/04/16/new-legislation-passed-for-sexting-by-linnea-bennett/

Discussion questions:     

1.)     Visit the EEF Web site at www.eff.org and develop a list of its current “hot” issues.  Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position.  Discuss whether you support this position and why.
Answer:
When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights. Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 140,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public.






2.)  What reasons might a firm give for joining and supporting EFF?
Answer: 
I've been supporting it in a minor way for many years, joining early on and making small contributions of news services and money. It's been doing very good work, and you should examine the resume of that work on the EFF web site. It's my firm belief that there is no greater catalyst for the success of a society than liberty. History tells that story again and again around the world. As new aspects of society -- and whole new societies -- are built online, the EFF's mission is to protect that liberty. The payoff, if it succeeds, is tremendous, a huge increase in economic prosperity and an incalculable dividend of personal freedom

link:  http://www.templetons.com/brad/eff.html/

3)  The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor.  The CFO has asked if you, the CIO, support this action.  What would you say?
  Answer:
 I would supposedly for the best go for it, for the benefit of the company. . . 

Huwebes, Mayo 3, 2012

Case Study : Chapter 4

Discussion Questions

1. What type of security breaches of medical record are commonly today?
Answer:
In my search to find the types of security breaches of medical records that are common I found: In October 2008, hackers broke into a data goldmine at the University of California, Berkeley. They infiltrated 20 separate databases kept on a server at the health services center and over a span of six months, stole Social Security numbers, birth dates and addresses. In some cases they lifted immunization records.
Shelton Waggener, the university's associate vice chancellor and chief information officer, suspects the thieves had been scanning millions of IP addresses looking for a weak link and stumbled into the server. On April 21, administrators learned of the break-in when they discovered a taunting message hinting at the hackers' accomplishment. "It was a version of 'Kilroy was here,'" says Waggener.



link: http://www.forbes.com/2009/06/03/health-identity-theft-lifestyle-health-medical-records.html

2. What measures are being taken by the government and private industry to safeguard EHR's?
Answer:
Searching the net a stumbled upon :

Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).
This practice brief identifies categories of health information that are afforded special protections under law or may otherwise require a higher degree of security. It recommends system features and practices that will help secure sensitive information in EHRs and afford organizations satisfactory assurances that sufficient safeguards shield this information from misuse.
HIM professionals must be aware of high-risk groups and be able to assess whether electronic systems include features and functionality that may increase risk of inappropriate use and disclosure or offer additional layers of protections for sensitive information.
link: http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039956.hcsp?dDocName=bok1_039956

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
Answer:
 ARRA aslo requires healthcare institutions to notify individuals who are affected by security breaches, provides for increase fines for noncompliance, and authorizes state attorneys general to prosecite institutions violating HIPAA regulations. Furthermore, The clear intent of these provisions is to increase enforcement of HIPPA, The development of procedures, standards, and technology is left to the private sector, which clearly recognizes htat there are major challenges ahead  and has begun to organize to meet these challenges.

Discussion Questions

1. How does Google's business model use personal data?
Answer:
First, The Google Business Module is Founded in 1998 by Stanford graduate students Larry Page and Sergey Brin, Google is the dominant search company on the Internet. The company's primary revenue source comes from advertising related to Internet searches. But it is not the only revenue source.
How it Works: When a user clicks on an AdWords text ad, the company or individual who composed the ad is charged a fee every time someone clicks on the ad. This type of advertising is known as pay per click (PPC) advertising. Additionally, Google pays a commission to websites, blogs, and other online destinations to display the Google ads on their sites. This is the AdSense program.

2. What do you think are the major privacy concerns raised by Google's business model and applications?
Answer:
 Data Leaks
On 10 March 2009, Google reported, for example, that a bug in Google Docs had allowed unintended access to some private documents. It was believed that 0.05% of all documents stored via the service were affected by the bug. Google claims the bug has now been fixed.

courtesy of wikipedia.org
 
3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
 Answer:
Yes, because of its personal user information that are vital and if exposed may prove to be fatal on the users part in terms of privacy.