Sunday, May 13, 2012

Chapter 10: Case Study

Problem with the Suppliers

Question to Consider

1. How can an organization ensure that all the members of its supply chain will behave ethically?


Ans: The organizations should have a contract that all the members of its supply chain will signed it so that if something bad will happen in their organizations they have the way to deal  with it.



2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

Ans: The organizations will also behave ethically to have their trust to their suppliers and business partners. And if you do this the suppliers and your business partners will do the same.




Manufacturers Compete on Green Computing



Questions to Consider


1. How have green computing efforts lowered the total cost of computer ownership?

Ans: It will focus on how equipment power consumption impacts the overall power usage and total cost of ownership and deploy to meet their business needs. It will also briefly cover the general technological trends in the IT industry which are available in the race to meet green computing requirements.

source: http://www.towardsgreen.blogspot.com/

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.  
 

Chapter 9: Case Study

Twitter Emerges as New Source for Iran protesters

Question to Consider

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?


Ans: As I read in a site this are the value that most of the Iranian people question in Twitter "How is Twitter changing the way they live?". This makes Twitter practically ideal for a mass protest movement, both very easy for the average citizen to use and very hard for any central authority to control. The same might be true of e-mail and Facebook, but those media aren't public. They don't broadcast, as Twitter does.

source: http://www.time.com/time/world/article/0,8599,1905125,00.html#ixzz1v7Tq4CLd 

2. How trustworthy is the information one gleans from social networks such as Twitter?


Ans: I think it is more than enough to trust social networking sites such as twitter because they know what is the risk if they cannot protect the personal information of the user. And if the user's information is leaked I think twitter will not charge for the accused because they have the privacy settings that the user will edit their information.

Social Networking Disasters for Dominos


Questions to Consider



1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

Ans: Domino's should react faster to have good result and to be more trustworthy to their jurisdiction.




2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?


Ans: Domino's should not only response for the online media but also in the usual printed press so that it will be more effective than responsing only the only media the greater the response is the greater the Domino's will precedent for other to follow them in the future.

3. Identify three lessons that other companies could learn from Domino’s experience.

Ans: The three lessons that other companies could learn from Domino's experience are they should more careful, be more reliable and always get the heart of the people.
   
  

Chapter 8: Case Study

Western Cape Striving to Eliminate the Digital Divide

Question to Consider

1. How important is access to ICT in children’s education?

Ans: It is important because in this new technologies they can help school in teaching like for example watching an educational movie to the students and many more. It also good to the student to have their knowledge in this technologies because they will need those skills in the future.

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

Ans:  I think the barriers that stand in the way to have a universal access to ICT is money because many less fortunate people cannot afford to have an access to ICT.


Technological Advances Create Digital Divide in Health Care



Questions to Consider



1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?


Ans: The example I can give is almost of the wealthy people will not grab this healthcare services because they have money to go to the hospital in to their check any day they want. And for the poor people many will grab it because healthcare services is their only chance to have a check up because they lack paying any resources to the hospital.



2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

Ans: I think they should make major investment in telemedicine not only to provide improved services that only wealthy people can afford but also to the poor people to help them.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?  

-  
 

Chapter 7: Case Study

Boeing Dream liner Faces a few bumps in the road

Questions to Consider

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

Ans: I think it is common occurrence because software problem will probably occur and we cannot know where it will happen because nobody in this world is perfect. So the least you can do is just study again your software and detect the problems to have a good finish result.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?.

Ans: In order to do that the organizations must check their all software's if it have a problem, check also their product and explain it to the people the way the people will understand their problem it it will not change their mind to trust this organizations.

  
Patriot Missiles Failure



Questions to Consider



1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

Ans: The steps that the developer should have to do is first check their patriot software have a testing operation before you lunch your software to the public and always secure your software to have a good result.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?


Ans: I think they choose to deploy the Patriot missile to Israel and Saudi Arabia because it is a deserted country and I think they deploy it in here to have a low casualties if something must happen.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?.

Ans: The lesson that can be applies to development of business information system software is always secure your software and always check the software and always leave it to the professionals to do their job to have a good business information system software result. 

  

Chapter 6: Case Study

RIAA fights Music Piracy

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?


Ans: For me it is helping the music recording industry because instead of illegally copying it the user may buy their albums because if the user illegally copying the music he/she will receive an email from your ISP regarding to music copyright infringement. This is a good chance for the music recording industry to gain more resources. 

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?


Ans: It has no negative impact on the ISP because it will just warned the user to stop an illegal doing like copying the music without any permission.




Lotus Vs. Borland


Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

Ans: The similarities of the two spreadsheet programs.

    Microsoft Excel and Lotus 1-2-3 are both spreadsheet software for computers. The two programs offer similar features but are manufactured by different companies and store information in different file formats. Spreadsheets allow you to organize and manipulate data in columns and rows. They are typically associated with numerical applications, but a spreadsheet can hold any kind of data. These two programs are more similar than they are different, but users who switch between them should know the differences


source: http://www.ehow.com/list_7102635_differences-microsoft-excel-lotus-1_2_3.html

Ans: The differences of the two spreadsheet programs.


     Excel and Lotus 1-2-3 is the way you move around a worksheet. Moving around in a worksheet, using navigation keys is done differently in each spreadsheet program. For example, when hitting the "HOME" key in Lotus 1-2-3, the cell in the upper-left hand corner of a row is selected. However, in Excel, if you hit the "Home" key, the first cell in the current row will be selected. Although the navigation keys can be changed in Excel to perform the same way as Lotus 1-2-3, you cannot change the navigation keys in Lotus 1-2-3 to perform the same way as Excel's navigation keys do (Microsoft Corporation, 2008).

source: http://voices.yahoo.com/excel-vs-lotus-whats-difference-4080043.html

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?


Ans: It has a big impact it is because the user's of this software will not trust this software industry because of the big delay the court did.  

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?


     

Chapter 5: Case Study

Question to Consider

1. Does sexting represent a form of expression that is protected by the First Amendment? 

Ans: Sexting is not a form of expression it is because sexting is the sending of suggestive material, such as photos or sexual jokes, through text messages. And a charge of child pornography can include the production, distribution and possession of photos of minors engaging in sexually explicit conduct.  It is not, of course, protected by the First Amendment.


source: www.lawbrain.com 

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 

Ans: For me as a student all I can do is just to warn my friends and  relatives to avoid sending or posting any explicit material, such as photos or sexual messages or jokes through text messages and told them to spread it also to their other friends.


The Electronic Frontier Foundation (EFF)


Questions to Consider

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF's position. Discuss whether you support this position and why?

Ans: For me the current hot issues that interests me is the issues about Prosecutors wants location via twitter online.

New York City prosecutors have subpoenaed Twitter in order to get data about the account holder's location during the Occupy Wall Street protests, the Electronic Frontier Foundation disclosed in a blog post today.
By granting the subpoena request -- which Twitter has challenged -- the court is allowing prosecutors to bypass the need for a search warrant as typically required when seeking location information, the EFF argues.
"The judge also allowed the government to get access to location information without a search warrant. Twitter keeps a record of a user's IP address when he logs in to post a tweet," Hanni Fakhoury, EFF staff attorney, writes. "Since the majority of Twitter users access the site through mobile phones, these IP addresses are keys that help unlock a person's location."


As for now I cannot tell if I will support it or not because I do not have any twitter account and I also choice this topic even though I do not have any account in twitter because I think this is an interesting issues.

2. What reasons might a firm give for joining and supporting EFF?

Ans: I think to locate or get access to the location information without a search warrant.

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say?    
 
Ans: I think it is a good idea because it can help us to have a better telecommunications equipment and have a good services in this technologies.

Wednesday, May 2, 2012

Chapter 4: Case Study


Discussion Questions

1. What type of security breaches of medical record are commonly today?


- The type of security breaches of medical record commonly use today is EMR or Electronic Medical Records and EHR or Electronic Health Records.

2. What measures are being taken by the government and private industry to safeguard EHR's?


- The measures being taken by the government and private industry to safeguard EHR are the to secure the privacy concerning the healthcare apply for both papers and electronic records. 

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?


    

Discussion Questions

1. How does Google's business model use personal data?


- Google Business model uses personal data is firmly to the privacy of their advertisers and users.

2. What do you think are the major privacy concerns raised by Google's business model and applications?


- The major privacy concerns raised by Google's Business model and applications are to secure their business to the hackers and spammers that trying to destroyed their business.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.


- I think Google has taken adequate measures to protect its user's privacy it is because if the Google will not protect or secure it user's privacy many advertisers or consumer that trust Google will not work on them anymore because of their low protection in user's privacy.

Chapter 3: Case Study

Questions to Consider

1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?


- I think in trading process the trader should know the person or company that they will be trading so that a positive way will happen and it come to a clean and fair trade and not using illegal means and dirty tactics. 

2.What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Discussion Questions

1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?


- For me Mike Lynn did not acted in a responsible manner because he lie on the people around him just to protect himself so that he will not be fired.
    
2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?
3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that would have a led to the problem being promptly addressed without stiring up animosity among the parties involved.

Tuesday, April 17, 2012

Chapter 2: Case Study



Questions to Consider

1. What message is sent to IT workers by the actions of New York Law School and Colleges even if unrelated job-performance issues justified their actions in firing Gross and Perry?


2. Since the incident,  number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. most of the laws state that worker who reports such a discovery is immune from any criminal,civil or administrative liability. failure to report the discovery can result to a fine, imprisonment or both,do you think such laws will encourage reporting? why or why not?


Discussion Questions

1. How to distinguish between a gift and a bribe? Provide an example of a "gift" that falls in the gray area between a gift and a bribe.

Bribe - 
anything given or serving to persuade or induce.


Gift -  the transfer of something without the expectation of payment. 
An example of gift is when you gave a thing to your friend which comes from your heart and not even asking for any exchange.

2. Discuss the following topic: law do not provide a complete guide to ethical behavior. An activity can be legal or not ethical.

Law should always have a complete guide to ethical behavior because law is powerful tool which we can use to clear our names if we have commit any cases. There are also illegal doings that is against the law.

3. What is a professional malpractice? Can an IT worker ever be sued for professional malpractice? why or why not?


Malpractice refers to Negligence or misconduct by a professional person, such as a lawyer, a doctor, a dentist, or an accountant. We should always meet the standards of a company which will need an IT professional so that we can avoid professional malpractice

4. Review the PMI member code of ethics in appendix E. for each point in the code, provide an example of a project manager action that would break the code.


5. What must IT professionals do to ensure that the project they lead meet the clients expectations and do not lead the charges of fraud, fraudulent misrepresentation, or breach of contact.

Just do it seriously and honestly by this values we can ensure that it will meet the expectations of the client and may not lead to any charges of fraud and many more.

6. Should all IT professionals be either be licensed or certified? why or why not?

In my opinion all IT professional should have a licensed or certificate so that any company will hire you and trust your capability as a IT professional. 

7. What commonalities you find among  the IT professionals codes of ethics discussed in this chapter ? what differences are there? do you think there are any important issues not addressed by these codes of ethics.



Discussion Questions

1. This incident illustrates some of the potential problems for small software developers working with giant software manufacturers to extend or enhance their products. Provide two good reasons why small developers should still consider working closely with large software firms?
 
Small developers should have a good business proposal and they should also have a good offer to the customer. For me this is a two good reason why small developers should still consider working with large software firms because the small developers will meet the products of the large software firms.     

2. What measures could Limit None have taken to better protect itself from Google's alleged actions? What measures could Google have taken to protect itself from this lawsuit?

Limit None should never give their information of their product. 
        

3. Do research on the Web to find out how this case is proceeding in the courts. Write a short summary of your findings.  






Chapter 1: Case Study

Questions to Consider


1. Which issue is more disconcerting- the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? defend your position.


The most disconcerting is the fact that the board member leaked confidential about the firm it is because you are not allowed to tell something about confidential information and it is not proper to leaked information especially if it is confidential because it can lead you into prison.


2. Can the use of pretexting to gain information ever be justified? is it consider legal under any circumstances.


For me pretexting is legal it is because we have the right to conceal what is right or wrong to gain information.


Discussion Questions


1. There are many ethical issues about which people hold very strong opinions-abortions, gun control and the death penalty, to name a few. If you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues, would it affect your ability to work with this person? why or why not?


It will not affect my ability to work with the person whom his/her opinion is different from me, it is because working in a team needs all the opinion of the members who are in the team. By sharing all the opinions of the member even if it is different from others we should so that we can come up a good result in the project.


2. What do you think are the most important factors that helped you define your own personal code of ethics?


The most important factors that helped me to define my own personal code of ethics is to collaborate with people because from this way I can also learn what is the most important thing in ethics.


3. Do you think that ethics in business is improving or getting worse? Defend your position.


I think it is improving because of the helped of the new technology created by people today which helps a lot in today's business.


4. The ethics resource center identified five characteristics of a successful ethics program suggest a sixth characteristics, and defend your choice.


I would suggest "compassionate" it is because you should be compassionate in creating a successful ethics program. By showing how compassionate you are this may also lead to a good effect in the people around you.


5. Which incident has a higher negative impact on an organization an unethical act performed by an hourly worker or the same act performed by a senior manager of the organization? Explain your answer fully. Should the hourly worker be treated differently than the senior manager who committed an unethical act? Why or why not?


For me it should be treated fairly because all people can make a mistake, but the higher negative impact is the hourly worker it is because the senior manager has the higher position  . Other people may think that the senior manager is correct even if it is the same unethical act performed by the senior manager and the hourly worker because of the position that are assigned to them that what I think people may think.


6. It is common and acceptable practice for managers to hold people accountable to meet "stretch"  goals, quotas, and budgets. How can this be done not encourage unethical behavior on the part of employees.


I think it is common and acceptable practice for managers to hold people accountable if the people well always trust their manager.

7. Is every action that is legal also ethical? Can you describe an action that is legal but ethically wrong? Is every ethical action also be legal? Is the law, not ethics the only guide that business managers need to consider? Explain.


Every action will always be legal in ethics but a some actions can also be illegal like for example a Company which will conducting a community services but the people who is assigned in the budgetary money will corrupt the money by this way of doings we can tell that it is illegal action in ethics.


8. Do you think it is easier to establish an ethical work environment in a nonprofit organization? Why or why not?


No it is not easy because we always need money.  


9. This chapter discusses the four approaches to dealing with moral issues. Identify and briefly summarize each one. Do you believe one perspective is better than others? if so, which one and why?





Discussion Questions


1. CA Executives involved the accounting scandal were not accused of reporting bogus contracts or hiding major problems in business. The contracts that were backdated  were real sales agreement. Was this really a crime? Should the individuals have been punished so harshly?


2. In December 2004, CA appointed Patrick J. Gnazzo as a senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically, Gnazzo served in this role at United Technologies for 10 years and had been a member of the board directors of the ethics Offices Association .Gnazzo reported to a  new executive vice president and a general counsel at CA as well as the board's Compliance committee. Outline some of the Actions Gnazzo might have been taken in his first six months on the job.


3.  John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and President his first few months with the firm were rough- major customers threatened to dumb the firm some products were behind schedule and were of poor quality; executives had to be fired for breaking company  rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. what sort leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?


4. CA has been hit with numerous scandals since the late 1990's. these scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on this distractions. compare the revenue growth and stock price of CA to that of some of its competitors over the period 2004-2008 (be sure to use CA's corrected figures!) can you detect any impact of these scandals on CA's performance? what else might explain the difference in performance?


Discussion Questions


1. Identify at least two other companies that mange their suppliers in a 
manner similar to Dell computers. Do these companies have anything in 
common with Dell?


2. Can you identify any disadvantages for dell in taking the approach to 

managing suppliers?


3. Do you think that this approach to managing suppliers is unethical, or is it 

acceptable and ethical? Explain your reasoning.


4. Would you recommend any changes to the way Dell manages suppliers? 

Defend your position.




Discussion Questions


1. Discuss how a CIO might handle Schrage's Scenarios using the suggested process for ethical decision making presented in this chapter.


2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage's scenarios.


3. Must businesses choose between good ethics and financial benefits? explain your answer using Schrage's scenarios as example. 

Friday, April 13, 2012

What takes you be an IT Professional?



To be an It Professional we should have the value "Discipline" so that in any obstacle that comes to
our life we can solve that problem without any delay. We also need concentration and knowledge
so that we can face any questions that will be asked by our fellow IT colleagues. Master our all
subjects that relates in our field so that we can face the problems in the future. Always interact
people so we that we can also gain any knowledge in them. Always train any programming language
to master our skill in programming. IT Professionals should performs a variety of functions that ranges from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as management and administration of entire systems. Information technology is starting to spread further than the conventional personal computer and network technologies, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs. It Professionals should manage technology and spans a wide variety of areas that include computer softwareinformation systems,computer hardwareprogramming languages but are not limited to things such as processes, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy: business process automation, providing information, connecting with customers, and productivity tools.