Tuesday, May 15, 2012

Chapter X : Case Study # 3 : Manufacturers Compete on Green Computing

1.)Have have green computing efforts lowered the total cost of computer ownership?

Green Computing emphasizes the progress its making in removing toxic materials from all the computers. And for the competitors, green computing is a way to differentiate themselves to comsumers who have come to see green computing as an excellent opportunity to save money through reduced power consumption and to lessen their negative impact on the environment or in other words green computing is a tradition of environmentalism.

2.)Which approach can yield greater benefits - building greener computers or implementing programs that change users' behavior so that they operate their computers in a more responsible manner? Explain your response.

Implementing programs that change users' behavior so that they operate their computers in a more responsible manner. Because as a reliable and responsible computer user , we should already know that whenever we turn on our computers their is many impact to consume energy. To be responsible computer user, we should have time management when turning on the computer and when it should turn it off. We are just using energy and we should use it properly so that the impact to us is not so dangerous.

3.)Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 

Historically, computers have posed a serious problem to the environment. Like other electronics, computers typically contain toxic chemicals such as arsenic, lead and mercury. Computers also typically use massive amounts of electricity, contributing to the energy crisis, carbon dioxide emissions and global warming. Many computers end up in landfills after their useful life cycles are over, despite laws prohibiting such disposal. Fortunately, there are several green technology makers that are making strides toward making greener computers. Even better, these companies are the ones that we all know and trust, such as Hewlett Packard, Dell, Apple and Lenovo. Their green computers and computer-related products are readily available, and they even provide recycling and buy-back programs to help you dispose of your unwanted computers, peripherals and other electronic devices.
In recent years, Hewlett Packard has introduced many Energy Star qualified computers onto the market, including several that have won high EPEAT ratings. For example, the HP EliteBook 2530p notebook computer is Energy Star 5.0 qualified and has earned EPEAT gold. Also, Hewlett Packard has qualified for the Environmental Protection Agency's SmartWay label, which is applied to products and services with reduced transportation emissions. HP is striving to use more recycled materials in its products and product packaging. HP has also instituted buy back and recycling programs for all brands of computers, monitors, printers, scanners and other computer technology. HP has its own huge recycling facility in Roseville, California which processes about 4 million pounds of electronics per month.

http://www.brighthub.com/environment/green-computing/articles/61813.aspx

Chapter X : Vignette : Problems with Suppliers

1.)How can an organization ensure that all the members of its supply chain will behave ethically?

The use of nontraditional workers, including temporary workers, contractors,consulting firms,H-1B visa workers, and outsourced offshore workers, gives an organization at a lower cost. The use of nontraditional workers also raises ethical issues for organizations.Employers must take ethical decisions about these sources or to spend the time and money to develop their current staff to meet the needs of the business. 

2.)What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

Responsibility does an organization have to ensure that its suppliers and business partners behave ethically with the use of electronics and information communications technology (ICT) industry recognizes the need for a code to address ethical issues in the areas of worker safety and fairness, environmental responsibility, and business efficiency. 

Chapter IX : Case Study # 3 : Social Networking Disaster for Domino's


1.) Some observes believe taht if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done - lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the andvantage of 20/20 hindsight, how might Domino's have reacted more effectively?

As what i have read about the Dominos' issue it was a delay action. They should react earlier and pulled out the video from the Youtube Web site. Because the longer the video was in public the more damage and negative impacts to the Domino.

2.)Do you find it unusual that Domino's response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropiate way to respond under these circumstances? Why or why not? Does Domino's use of the online  set a precedent for others to follow in the future?

No, Domino should response primarily on the printed press because in newspapers people can understand , react and give some opinions of the certain issue that the Domino's fast food is facing. Unlike in the You Tube , people can make also story about the burgers that they sell , give some negative impacts to the people who saw the video in You Tube site. 

3.)Identify three lessons that other companies could learn from Domino's experience.

Being in business world expect for competitors, and you should be ready for the next competition. In business, you should think first about the conclusion before you start involving yourself in business industry. The other companies should learn that in business you are ready to face all the challenges that your competitors doing. You should have more knowledge about what your businesses are and lastly you should have back - ups whenever your competitors are starting to make a story about or certain business. 

Chapter IX : Vignette : Twitter Emerges as News Source for Iran Protesters

1.)Many people question the value of the Twitter's goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there are other ways that Twitter and other social networks could be used by the people and organizations to add real value?

Social Networking Website is a site whose purpose is to create an online community of Internet users that enable members to breakdown barriers created by on time, distance and cultural differences. The Iran illustrates the potential value to society of social networking tools such as Twitter, it helped much the Iran using the Service to share commentary about the ongoing protest and to plan future rallies and protest. The Iranian government began to make use of Twitter to communicate its own message.

2.)How trustworthy is the information one gleans from social networks such as Twitter?

Members of an online social network may use the site to interact with friends, family members, and colleagues or just people they already knew. But they may also wish to develop new personal and professional relationships. When using Twitter, we should make sure that all of our personal information should not be presented in the social networking sites because some people may use your personal information in his/her unethical intention.

Chapter VIII : Case Study # 3 : Technological Advances Create Digital Divide in Health Care


1.)Can you provide examples that either refute or confirm the idea that a gap exist between the kinds of healthcare services avilable to the wealthy and the poor in the United States?

There are many ways to conform or refute the idea that a gap exists between the healthcare services available to the wealthy and the poor in the United States. The wealthy people can hire a doctor or a physician to look over the patient's illness while the poor people can't afford doctors/physician to look over them. Another example is wealthy people can go to see their doctors anytime to have a general check ups while the poor people cannot afford the fair going to the hospital/clinic.

2.)Should healthcare organizations make major investments in telemedicine to provide improved services taht only the wealthy can afford?

Telemedicine employs modern telecomunications and information technologies to provide medical care to people who lived far away from the health care providers. Wealthy people can afford the medical care services even they are just lived in urban place. This technology reduces the need for patients to travel for treatment and allows health care professionals to serve more patients in a broader geographic area. 

3.)What are the drawbacks of telemedicine? What situations might not led themselves to telemedicine solutions?

On balance the benefits of telemedicine are substantial, assuming that more research will reduce or eliminate the obvious drawbacks. The main drawbacks of telemedicine that can be envisaged are : A breakdown in the relationship between health professional and patient.Next, a breakdown in the relationship between health professionals.And quality of information issues. When you live in or near a large city, having convenient access to needed medical care is easy to take for granted. Often a minor ailment can turn into something much more serious when not treated. Cisco Systems has developed a solution to bridge the gap of distance between patient and physician. The  Telemedicine Solution is a technology platform that allows doctors and patients to interact while being miles apart.

http://news.inventhelp.com/Articles/Medical/Inventions/healthpresence-telemedicine-solution-12548.aspx#.T7LveOun-cc

Chapter VIII : Vignette : Western Cape Striving to Eliminate the Digital Divide

1.)How important is access to ICT in children's education?


Information and Communication Technology (ICT) is very important access in children's education. It can help many students to be ready for their future jobs or for at least be at a higher starting point when they enter their tertiary studies in graphic design or music production. Also it can make students more reliable in making their assignments and projects easily. They are not ignorant about the new technologies in their generation. ICT educates the students and in the same time their educators.


2.)What are the barriers that stand in the way of universal access to ICT for everyone who wants it?


The barriers that stand in the way of universal access to ICT for everyone who wants are schools in rural areas at the same time they can't afford the ICT program for their school, some schools don't have enough space for their new computer laboratory, schools don't have any sponsorsto have the ICT program and so on.

Chapter VII : Case Study # 3 : Patriot Missile Failure

1.)With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot's effectivenessenought to make it obvious taht the missile was a strong deterrent against the Scud? Why or why not?

The Patriot is a surface-to-air defence missile system manufactured by Raytheon3 and used by the United States Army, originally designed to protect against Soviet cruise missiles and medium to high altitude aircraft. In order to avoid detection it was mobile and would only operate for a few hours at a time.
During Operation Desert Shield (the operation to move forces to the Gulf region), Patriot battalions were deployed in strategic locations in Saudi Arabia and Israel to defend key assets, military personnel, and citizens against Scud missiles launched by Iraqi forces.
Each battalion usually comprised of six batteries, with each battery containing a number of components including a single ground based radar unit used for surveillance target detection and tracking, an Engagement Control Station to control missile interceptors, eight missile launchers, as well as various communications and relay components.4
The Patriot’s weapon control computer performs crucial system functions for tracking and intercepting targets, as well as other control tasks. The system tracked and intercepted missiles in a number of stages:
  1. The system was instructed to search for airborne objects with Scud missile characteristics (based on information such as velocity, latitude, longitude, azimuth, and altitude) on its radar.
  2. A range gate, an electronic device in the radar, calculates an area in the air space for where the system should look next for the incoming missile. The missile is tracked by the system as it approaches.
  3. The Patriot would launch one of it’s own missiles once the incoming missile was in range.
http://sydney.edu.au/engineering/it/~alum/patriot_bug.html

2.)What ethical decisions do you think the U.S Military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

Shortly after Operation Desert Shield began, Patriot battalions were deployed to Saudi Arabia and then to Israel. These battalions were generally placed in permanent positions to defend key assets, military personnel, and citizens against Iraqi Scud missiles.
Because this was the first time the Patriot had been used to defend against Scud missiles, which fly at approximately MACH 5 (3750 mph), the Army had much to learn about tracking and intercepting them. To obtain Scud data, the Army relied on operational experience conveyed by Patriot users as well as other intelligence sources. With the launch of each Scud, the Army became more and more knowledgeable about the Scud's flight characteristics. Recorded data is another more useful tool that could have provided detailed data on the Patriot's actual performance. However, obtaining recorded performance data from Patriot units was hindered for two reasons.
First, the Patriot was not equipped with an embedded (internal) data recorder to retain system performance information. Second, although portable, external data recorders were available, U.S. commanders decided not to use them because they believed the recorders could cause an unanticipated system shutdown. However, Israeli commanders used data recorders on the Patriot systems they controlled and provided this data to the U.S. Army.

http://www.fas.org/spp/starwars/gao/im92026.htm

3.)What key lessons from this example of safety-critical software development could be applied to the development of business information system software?


Software development tools have direct and growing impact on the effective and efficient development of complex, safety-critical, real-time avionics systems and consequently on the safety of the flying public.  The developed avionics system software must be shown to comply with airworthiness requirements, which include functional, quality of service, and safety requirements.  The development processes performed by modern software development tools can be extremely complex and provide opportunities to automate the collection and documentation of evidence that the system requirements are met and that the development processes do not compromise the developed software requirements. 

http://www.tc.faa.gov/its/worldpac/techrpt/ar0636.pdf



Chapter VII : Vignette : Boeing Dreamliner Faces a Few Bumps in the Road


1). Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

High quality software systems are easy to learn and use because they perform quickly and efficiently; they meet their users' needs; and they operate safely and reliably so that system downtime  is kept to a minimum. Such software has long been required to support the fields air traffic control, nuclear power, automobile safety, healthcare, military and defense, and space exploration.

2.) What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?


The primary goal of software developers is the production of quality systems that meet the needs of the user. Software quality is defined in terms of customer satisfaction. "Risk" is understood as any potential threat to the delivery of a quality product. To meet the goal of quality software, developers focus on particular risks including: project and schedule slips, cost increases, technical and quality risks, the timeliness of the product, risks that the final product will not fit the business for which it was designed. Projects are managed focusing on these risks. Tools used to help identify and manage these risks include: risk tables, and lists of risks categorized by type, probability and impact. The checklist process is reminiscent of the process pilots go through before take off. As airline passenger we are made more comfortable by the fact that they go through this procedure. But unlike pilots, developers choose to ignore some risks. Risks levels are determined based on the anticipated impact of the risk and its probability of occurring. Only risks above limited specified levels are addressed.

http://dl.acs.org.au/index.php/ajis/article/viewFile/202/176

Chapter VI : Case Study # 3 : Lotus v. Borland

1.)Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.

Quattro Pro is a spreadsheet program developed by Borland and now sold by Corel, most often as part of Corel's WordPerfect Office suite while Microsoft Excel is a commercial spreadsheet application written and distributed by Microsoft for Microsoft Windows and Mac OS X.This is a big bonus to new users of the software who are defecting from other spreadsheet applications. In particular, you can make the choice of working in standard Quattro Pro Mode, Microsoft Excel Mode (based on Excel 2003 and earlier), or Lotus 1-2-3 Mode.

2.)The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?

The ruling was welcomed by Borland, which would have found it extremely difficult to pay the estimated $100 million in damages sought by Lotus. The case was appealed to the U.S Supreme Court, and in January 1996, five years after the suit began, the court affirmed the appeals court ruling for Borland. The case was significant for the software industry, which had been riddled with infringement lawsuits due to ambiguities in copyright law. The ruling made it clear that software copyrights could be successfully challenged, which further discourage the use of copyright to protect software innovation. As a result, developers had go through the more difficult and expensive patent process to protect their software products. 

3.)Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?

As the manager of Borland's software development I should prefer to made our own words and structure of menu command hierarchy because business is always a business. Every company has its own cleverness if we could make programs or spreadsheets more reliable and easy to use unlike for Lotus 1-2-3. And also I will not sold the Quattro spreadsheet program program because I can upgrade and made a new versions of it, so I can make my own money. 

Sunday, May 13, 2012

Chapter VI : Vignette : RIAA Fights Music Piracy

1.) Is the RIAA's strong stand on copyright infringement helping or hurting the recording industry?

Copyright Infringement is a violation of the rights secured by the owner of a copyright. The recording Industry Association of America justifies its strong anti piracy efforts as a means of both protecting the ability of the recording industry to invest new artist and new music,and giving legitimate online music sharing services a chance to be successful. The RIAA's story started on copyright infringement helping the music industry because it justifies anti piracy.

2.)Could an ISP's implementation and enforcement of the RIAA's multitier strategy have an negative impact on the ISP?

No, because ISP's implementation and enforcement of the RIAA's multitier strategy could help RIAA's reputation and it can protect the users of it. And it can notice to its subscribers  or notify its costumers about the notices and ask them to cease and desist. Lastly, ISP  can take a series of escalating sanctions against repeat offenders, ranging from slowing down the network speed to terminating service.  

Chapter V : Case Study # 3 : The Electronic Frontier Foundation (EFF)


1.)Visit the EFF Web site at www.eff.org and develop a list of its current "hot" issues. Research one EFF issue that interest you, and write a brief paper summarizing EFF's position. Discuss whether you support this position and why.

Global Network Initiative Gets an Inside Look at Tech Firms’ Human Rights Practices
NY Twitter Decision Fails to Recognize Content and Location Data Require a Warrant
And the privacy invasion award goes to …
EFF to Testify at Hearings on Expanding DMCA Exemptions for Jailbreaking and Video Remixing
The 2012 DMCA Rulemaking: A Primer
NY Twitter Decision Fails to Recognize Content and Location Data Require a Warrant
A New York judge's broad opinion, ordering Twitter to comply with a subpoena (PDF) and turn over account information about one of its users arrested for disorderly conduct in connection with an Occupy Wall Street protest, is worse the deeper you dig into it. 
The judge ruled (PDF) that the user, Malcolm Harris, lost ownership of his tweets once he posted them online, and therefore had no legal standing to challenge the subpoena. This decision prompted several worried responses, including our own, because our Fourth Amendment privacy rights should not be surrendered simply because we use online service providers that store information remotely. Even Twitter stepped in to defend Harris, filing a motion to quash (PDF) the subpoena.
The court's acceptance of the government's arguments for disclosure has resulted in a broad opinion that has far reaching consequences to free speech and privacy. The judge now has an opportunity to correct this error and grant Twitter's motion to quash the subpoena. If he doesn't, we hope that the New York appeals court will follow the direction of the Sixth Circuit with respect to contents of communications, and the Supreme Court with respect to location information, and insist on the protections of the Fourth Amendment.

https://www.eff.org/deeplinks/2012/05/NY-twitter-decision-fails-to-recognize-content-and-location

2.)What reasons might a firm give for joining and supporting EFF?

 EFF is a nonprofit, international advocacy and legal organization based in the United States.It s goal is to protect fundamental civil liberties relating to the use of technology, including free speech, privacy, innovation and consumer rights. It frequently undertakes court cases as an advocate of preserving individual rights. EFF's mission includes educating the press, policy makes and the general public about the liberties. Electronic Frontier Foundation is helping people especially the IT Users and IT-related organizations to be more responsible and to build more knowledgeable marketplace for the products they are selling.

3.)The Vice President of public affairs for your midsized telecommunications equipment company has suggested that the firm donate 10,000 dollars in equipment and services to EFF and become a corporate sponsor. The CEO has asked if you,the CIO , support this action.What would you say?

Being the CIO , I would happily support the certain action. Because it can help EFF do its job well. And to be more reliable to its goal that to protect fundamental civil liberties relating to the use of technology, including free speech, privacy, innovation and consumer rights. And also if the Vice President of public affairs for our midsized telecommunications equipment company as become a corporate sponsor, the EFF would be provide some hardware, software and IT services.

Chapter V: Vignette : Sexting

1.)Does sexting represent a form of expression that is protected by the First Amendment?

No,the First Amendment protects Americans' right to freedom of religion and freedom of expression.Sexting is a type of defamation which is First Amendment forbids. First Amendment interpreted by the Supreme court as applying to entire federal government, even though it only expressed only to Congress. Although people have the right to express, they must also exercise their communications to avoid defamation.

2.)What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?

Although teens are less concerned with online reputation management than adults, that doesn’t mean they’re unaware of the electronic privacy implications of sexting. Teens are fairly well educated as to the dangers of exposing private information or photos digitally. They also understand the impact on their online reputations, at least among their peer groups. Data from the Crimes Against Children Research Center at the University of New Hampshire suggest that sharing personal information electronically does not on its own correlate with an increased risk of harm. According to a survey of American adolescents, three out of four think sharing personal information or photos online falls between “somewhat safe” and “somewhat unsafe,” similar to how they perceive the dangers of underage drinking. Sexting should be educate respectfully and adopt a healthy digital environment at home, and engage in appropriate monitoring.

Wednesday, May 2, 2012

Chapter IV : Case Study # 3 : Is Google Watching You?

1.) How does Google's business model use personal data?

Google operates the most popular search engine in the world. Almost all of its revenue derives from its online advertising system embedded in the free products and services it offers to end users. Google offers free e-mail, Web page creation and publishing, blogging, Internet messaging, Web photo albums, online calendars, video sharing, document sharing and so on. First and perhaps foremost is the concern generated by the wealth of personal information Google is able to assemble using a user's login identity. Google then tracks what the user does - what words the user enters in the search engine, what sites the user visits, and the time and date of these events. Google uses this information to fine-tune advertising to the user's needs and preferences.

2.) What do you think are the major privacy concerns raised by Google's business model and applications?

The major privacy concerns raised by Google's business model and applications the corporation argued that Google had pledged to keep it's users' personal information private and that to hand over data would violate the trust of the users. Second, Google contented that in handing over this data, the company would be forced to reveal trade secrets regarding its search technology.Lastly, Google questioned whether the reason behind the DOJ's demand was justifiable and in fact lawful-- based on the  Electronic Communications Privacy Act. Google has done well with privacy relative to other companies.

3.) Do you think Google has taken adequate measures to protect its users' privacy? Explain your answer.

Yes, with its "do no harm" motto we can make sure that Google is making their job so convenient. From there pledge to  keep users' personal information, private and that to hand over data would violate the trust of users and contented that in handing over this data, the company would be forced to reveal trade secrets regarding its search technology . As what Google stated the best way for users to prevent an online breach of their privacy is to learn more about the online products and services they use. We can assure that Google has taken adequate measures to protect the users.

Chapter IV : Vignette : Privacy concerns abound with new IRS sytems

1.) What information about you is being held, who is holding it, and what is this information being used for? 

Information Privacy is the combination of communication privacy and data privacy.The information about me is being held by my parents. And this information being used for many years , it can enter me in different schools , it can hire me for a future job ,  and so on. This information about my self is being used for my identifications and my identity.

2.) What measures are being taken to safeguard this information, and what happens if it is inadvertently disclosed or deliberately stolen ?

In this present days there are many perpetrators that are interested to our identities or privacy. And we should be aware of it. When using social networking sites we should not put all out information if we don't want the identity thieves got all the information about ourselves. If my birth certificate will be stolen or lost. I should prefer to go to the National Statistics Office and report to them that my Birth certificate is lost.  

Chapter III: Case Study # 3: Whistle-Blower Divides IT Security Community

1.)Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

Yes, because Mike Lynn began investigating a flaw in the Internet operating system (IOS) used by Cisco routers. Through reverse engineering, he discovered that it was possible to create a network worm that could propagate itself as it attacked and took control of routers across the Internet. Lynn's discovery was momentous, and he decided that he had to speak out and let IT security professionals and the public know about the danger. His intentions to talk at a Black Hat conference and all three parties entered discussions with the conference managers to ISS pulled the plug. Cisco employees tore out 10 pages from the conference booklet, and ISS asked that Lynn speak on a different topic.

2.)Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not ?

Cisco employees tore out 10 pages from the conference booklet, and ISS asked that Lynn speak on a different topic. When Lynn resigned from ISS on the morning of the conference and decided to give the presentation as originally planned.

Chapter III: Vignette : Trading Scandal at Societe Generale

1.)Peter Gumble, European editor for Fortune magazine, comments, "Keivel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world, is that every so often, somebody is caught concealing a  position and is quickly - and quietly- dismissed...[This] might be shocking for people unfamiliar with macho, high-risk,high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good grader and and who won't is by giving every youngster it hires a chance to show his mettle. That means allowing even the most junior traders to take aggressive positions. This leeway is suppose to be matched by careful controls, but clearly their aren't foolproof". What is your reaction to this statement by Mr. Gumble ?

Fraud is an intentional deception made for personal gain or to damage another individual. As what Peter Gumble's statement banks should be aware of their hiring especially to the younger ones. The only way that banks can tell who will turn into a good trader and who won't is by giving every youngster it hires a chance to to show their mettle. Allowing young or out of experience traders is a wrong move because young traders are too aggressive just like Mr. Jerome Keivel. The company has lost their money without knowing taht their employee is making money in their company without any consent.

2.)What explanation can there be for the failure of SocGen's internal control system to detect Kreviel's transactions while Eurex detected many suspicious transactions?

 The SocGen risk-control expert used information provided by Kerviel and his supervisor as well as a compliance officer at the SocGen subsidiary as the basis of both of his replies to Eurex. Upon a more thorough investigation, a major problem became apparent. As SocGen risk-control experts carefully reviewed Kerviel's latest transactions, the SocGen risk-control shocked to discovered that the trades had resulted in a market exposure for the firm of 50 billion euros. SocGen discovered that Kerviel is committing computer fraud and he is using his insider knowledge to falsity of records to earn money.