Sunday, May 13, 2012

Chapter 10: Case Study

Problem with the Suppliers

Question to Consider

1. How can an organization ensure that all the members of its supply chain will behave ethically?


Ans: The organizations should have a contract that all the members of its supply chain will signed it so that if something bad will happen in their organizations they have the way to deal  with it.



2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

Ans: The organizations will also behave ethically to have their trust to their suppliers and business partners. And if you do this the suppliers and your business partners will do the same.




Manufacturers Compete on Green Computing



Questions to Consider


1. How have green computing efforts lowered the total cost of computer ownership?

Ans: It will focus on how equipment power consumption impacts the overall power usage and total cost of ownership and deploy to meet their business needs. It will also briefly cover the general technological trends in the IT industry which are available in the race to meet green computing requirements.

source: http://www.towardsgreen.blogspot.com/

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.  
 

Chapter 9: Case Study

Twitter Emerges as New Source for Iran protesters

Question to Consider

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?


Ans: As I read in a site this are the value that most of the Iranian people question in Twitter "How is Twitter changing the way they live?". This makes Twitter practically ideal for a mass protest movement, both very easy for the average citizen to use and very hard for any central authority to control. The same might be true of e-mail and Facebook, but those media aren't public. They don't broadcast, as Twitter does.

source: http://www.time.com/time/world/article/0,8599,1905125,00.html#ixzz1v7Tq4CLd 

2. How trustworthy is the information one gleans from social networks such as Twitter?


Ans: I think it is more than enough to trust social networking sites such as twitter because they know what is the risk if they cannot protect the personal information of the user. And if the user's information is leaked I think twitter will not charge for the accused because they have the privacy settings that the user will edit their information.

Social Networking Disasters for Dominos


Questions to Consider



1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

Ans: Domino's should react faster to have good result and to be more trustworthy to their jurisdiction.




2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?


Ans: Domino's should not only response for the online media but also in the usual printed press so that it will be more effective than responsing only the only media the greater the response is the greater the Domino's will precedent for other to follow them in the future.

3. Identify three lessons that other companies could learn from Domino’s experience.

Ans: The three lessons that other companies could learn from Domino's experience are they should more careful, be more reliable and always get the heart of the people.
   
  

Chapter 8: Case Study

Western Cape Striving to Eliminate the Digital Divide

Question to Consider

1. How important is access to ICT in children’s education?

Ans: It is important because in this new technologies they can help school in teaching like for example watching an educational movie to the students and many more. It also good to the student to have their knowledge in this technologies because they will need those skills in the future.

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

Ans:  I think the barriers that stand in the way to have a universal access to ICT is money because many less fortunate people cannot afford to have an access to ICT.


Technological Advances Create Digital Divide in Health Care



Questions to Consider



1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?


Ans: The example I can give is almost of the wealthy people will not grab this healthcare services because they have money to go to the hospital in to their check any day they want. And for the poor people many will grab it because healthcare services is their only chance to have a check up because they lack paying any resources to the hospital.



2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

Ans: I think they should make major investment in telemedicine not only to provide improved services that only wealthy people can afford but also to the poor people to help them.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?  

-  
 

Chapter 7: Case Study

Boeing Dream liner Faces a few bumps in the road

Questions to Consider

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

Ans: I think it is common occurrence because software problem will probably occur and we cannot know where it will happen because nobody in this world is perfect. So the least you can do is just study again your software and detect the problems to have a good finish result.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?.

Ans: In order to do that the organizations must check their all software's if it have a problem, check also their product and explain it to the people the way the people will understand their problem it it will not change their mind to trust this organizations.

  
Patriot Missiles Failure



Questions to Consider



1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

Ans: The steps that the developer should have to do is first check their patriot software have a testing operation before you lunch your software to the public and always secure your software to have a good result.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?


Ans: I think they choose to deploy the Patriot missile to Israel and Saudi Arabia because it is a deserted country and I think they deploy it in here to have a low casualties if something must happen.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?.

Ans: The lesson that can be applies to development of business information system software is always secure your software and always check the software and always leave it to the professionals to do their job to have a good business information system software result. 

  

Chapter 6: Case Study

RIAA fights Music Piracy

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?


Ans: For me it is helping the music recording industry because instead of illegally copying it the user may buy their albums because if the user illegally copying the music he/she will receive an email from your ISP regarding to music copyright infringement. This is a good chance for the music recording industry to gain more resources. 

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?


Ans: It has no negative impact on the ISP because it will just warned the user to stop an illegal doing like copying the music without any permission.




Lotus Vs. Borland


Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

Ans: The similarities of the two spreadsheet programs.

    Microsoft Excel and Lotus 1-2-3 are both spreadsheet software for computers. The two programs offer similar features but are manufactured by different companies and store information in different file formats. Spreadsheets allow you to organize and manipulate data in columns and rows. They are typically associated with numerical applications, but a spreadsheet can hold any kind of data. These two programs are more similar than they are different, but users who switch between them should know the differences


source: http://www.ehow.com/list_7102635_differences-microsoft-excel-lotus-1_2_3.html

Ans: The differences of the two spreadsheet programs.


     Excel and Lotus 1-2-3 is the way you move around a worksheet. Moving around in a worksheet, using navigation keys is done differently in each spreadsheet program. For example, when hitting the "HOME" key in Lotus 1-2-3, the cell in the upper-left hand corner of a row is selected. However, in Excel, if you hit the "Home" key, the first cell in the current row will be selected. Although the navigation keys can be changed in Excel to perform the same way as Lotus 1-2-3, you cannot change the navigation keys in Lotus 1-2-3 to perform the same way as Excel's navigation keys do (Microsoft Corporation, 2008).

source: http://voices.yahoo.com/excel-vs-lotus-whats-difference-4080043.html

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?


Ans: It has a big impact it is because the user's of this software will not trust this software industry because of the big delay the court did.  

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?


     

Chapter 5: Case Study

Question to Consider

1. Does sexting represent a form of expression that is protected by the First Amendment? 

Ans: Sexting is not a form of expression it is because sexting is the sending of suggestive material, such as photos or sexual jokes, through text messages. And a charge of child pornography can include the production, distribution and possession of photos of minors engaging in sexually explicit conduct.  It is not, of course, protected by the First Amendment.


source: www.lawbrain.com 

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 

Ans: For me as a student all I can do is just to warn my friends and  relatives to avoid sending or posting any explicit material, such as photos or sexual messages or jokes through text messages and told them to spread it also to their other friends.


The Electronic Frontier Foundation (EFF)


Questions to Consider

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF's position. Discuss whether you support this position and why?

Ans: For me the current hot issues that interests me is the issues about Prosecutors wants location via twitter online.

New York City prosecutors have subpoenaed Twitter in order to get data about the account holder's location during the Occupy Wall Street protests, the Electronic Frontier Foundation disclosed in a blog post today.
By granting the subpoena request -- which Twitter has challenged -- the court is allowing prosecutors to bypass the need for a search warrant as typically required when seeking location information, the EFF argues.
"The judge also allowed the government to get access to location information without a search warrant. Twitter keeps a record of a user's IP address when he logs in to post a tweet," Hanni Fakhoury, EFF staff attorney, writes. "Since the majority of Twitter users access the site through mobile phones, these IP addresses are keys that help unlock a person's location."


As for now I cannot tell if I will support it or not because I do not have any twitter account and I also choice this topic even though I do not have any account in twitter because I think this is an interesting issues.

2. What reasons might a firm give for joining and supporting EFF?

Ans: I think to locate or get access to the location information without a search warrant.

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say?    
 
Ans: I think it is a good idea because it can help us to have a better telecommunications equipment and have a good services in this technologies.

Wednesday, May 2, 2012

Chapter 4: Case Study


Discussion Questions

1. What type of security breaches of medical record are commonly today?


- The type of security breaches of medical record commonly use today is EMR or Electronic Medical Records and EHR or Electronic Health Records.

2. What measures are being taken by the government and private industry to safeguard EHR's?


- The measures being taken by the government and private industry to safeguard EHR are the to secure the privacy concerning the healthcare apply for both papers and electronic records. 

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?


    

Discussion Questions

1. How does Google's business model use personal data?


- Google Business model uses personal data is firmly to the privacy of their advertisers and users.

2. What do you think are the major privacy concerns raised by Google's business model and applications?


- The major privacy concerns raised by Google's Business model and applications are to secure their business to the hackers and spammers that trying to destroyed their business.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.


- I think Google has taken adequate measures to protect its user's privacy it is because if the Google will not protect or secure it user's privacy many advertisers or consumer that trust Google will not work on them anymore because of their low protection in user's privacy.