Tuesday, April 17, 2012

Chapter 2: Case Study



Questions to Consider

1. What message is sent to IT workers by the actions of New York Law School and Colleges even if unrelated job-performance issues justified their actions in firing Gross and Perry?


2. Since the incident,  number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. most of the laws state that worker who reports such a discovery is immune from any criminal,civil or administrative liability. failure to report the discovery can result to a fine, imprisonment or both,do you think such laws will encourage reporting? why or why not?


Discussion Questions

1. How to distinguish between a gift and a bribe? Provide an example of a "gift" that falls in the gray area between a gift and a bribe.

Bribe - 
anything given or serving to persuade or induce.


Gift -  the transfer of something without the expectation of payment. 
An example of gift is when you gave a thing to your friend which comes from your heart and not even asking for any exchange.

2. Discuss the following topic: law do not provide a complete guide to ethical behavior. An activity can be legal or not ethical.

Law should always have a complete guide to ethical behavior because law is powerful tool which we can use to clear our names if we have commit any cases. There are also illegal doings that is against the law.

3. What is a professional malpractice? Can an IT worker ever be sued for professional malpractice? why or why not?


Malpractice refers to Negligence or misconduct by a professional person, such as a lawyer, a doctor, a dentist, or an accountant. We should always meet the standards of a company which will need an IT professional so that we can avoid professional malpractice

4. Review the PMI member code of ethics in appendix E. for each point in the code, provide an example of a project manager action that would break the code.


5. What must IT professionals do to ensure that the project they lead meet the clients expectations and do not lead the charges of fraud, fraudulent misrepresentation, or breach of contact.

Just do it seriously and honestly by this values we can ensure that it will meet the expectations of the client and may not lead to any charges of fraud and many more.

6. Should all IT professionals be either be licensed or certified? why or why not?

In my opinion all IT professional should have a licensed or certificate so that any company will hire you and trust your capability as a IT professional. 

7. What commonalities you find among  the IT professionals codes of ethics discussed in this chapter ? what differences are there? do you think there are any important issues not addressed by these codes of ethics.



Discussion Questions

1. This incident illustrates some of the potential problems for small software developers working with giant software manufacturers to extend or enhance their products. Provide two good reasons why small developers should still consider working closely with large software firms?
 
Small developers should have a good business proposal and they should also have a good offer to the customer. For me this is a two good reason why small developers should still consider working with large software firms because the small developers will meet the products of the large software firms.     

2. What measures could Limit None have taken to better protect itself from Google's alleged actions? What measures could Google have taken to protect itself from this lawsuit?

Limit None should never give their information of their product. 
        

3. Do research on the Web to find out how this case is proceeding in the courts. Write a short summary of your findings.  






Chapter 1: Case Study

Questions to Consider


1. Which issue is more disconcerting- the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? defend your position.


The most disconcerting is the fact that the board member leaked confidential about the firm it is because you are not allowed to tell something about confidential information and it is not proper to leaked information especially if it is confidential because it can lead you into prison.


2. Can the use of pretexting to gain information ever be justified? is it consider legal under any circumstances.


For me pretexting is legal it is because we have the right to conceal what is right or wrong to gain information.


Discussion Questions


1. There are many ethical issues about which people hold very strong opinions-abortions, gun control and the death penalty, to name a few. If you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues, would it affect your ability to work with this person? why or why not?


It will not affect my ability to work with the person whom his/her opinion is different from me, it is because working in a team needs all the opinion of the members who are in the team. By sharing all the opinions of the member even if it is different from others we should so that we can come up a good result in the project.


2. What do you think are the most important factors that helped you define your own personal code of ethics?


The most important factors that helped me to define my own personal code of ethics is to collaborate with people because from this way I can also learn what is the most important thing in ethics.


3. Do you think that ethics in business is improving or getting worse? Defend your position.


I think it is improving because of the helped of the new technology created by people today which helps a lot in today's business.


4. The ethics resource center identified five characteristics of a successful ethics program suggest a sixth characteristics, and defend your choice.


I would suggest "compassionate" it is because you should be compassionate in creating a successful ethics program. By showing how compassionate you are this may also lead to a good effect in the people around you.


5. Which incident has a higher negative impact on an organization an unethical act performed by an hourly worker or the same act performed by a senior manager of the organization? Explain your answer fully. Should the hourly worker be treated differently than the senior manager who committed an unethical act? Why or why not?


For me it should be treated fairly because all people can make a mistake, but the higher negative impact is the hourly worker it is because the senior manager has the higher position  . Other people may think that the senior manager is correct even if it is the same unethical act performed by the senior manager and the hourly worker because of the position that are assigned to them that what I think people may think.


6. It is common and acceptable practice for managers to hold people accountable to meet "stretch"  goals, quotas, and budgets. How can this be done not encourage unethical behavior on the part of employees.


I think it is common and acceptable practice for managers to hold people accountable if the people well always trust their manager.

7. Is every action that is legal also ethical? Can you describe an action that is legal but ethically wrong? Is every ethical action also be legal? Is the law, not ethics the only guide that business managers need to consider? Explain.


Every action will always be legal in ethics but a some actions can also be illegal like for example a Company which will conducting a community services but the people who is assigned in the budgetary money will corrupt the money by this way of doings we can tell that it is illegal action in ethics.


8. Do you think it is easier to establish an ethical work environment in a nonprofit organization? Why or why not?


No it is not easy because we always need money.  


9. This chapter discusses the four approaches to dealing with moral issues. Identify and briefly summarize each one. Do you believe one perspective is better than others? if so, which one and why?





Discussion Questions


1. CA Executives involved the accounting scandal were not accused of reporting bogus contracts or hiding major problems in business. The contracts that were backdated  were real sales agreement. Was this really a crime? Should the individuals have been punished so harshly?


2. In December 2004, CA appointed Patrick J. Gnazzo as a senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically, Gnazzo served in this role at United Technologies for 10 years and had been a member of the board directors of the ethics Offices Association .Gnazzo reported to a  new executive vice president and a general counsel at CA as well as the board's Compliance committee. Outline some of the Actions Gnazzo might have been taken in his first six months on the job.


3.  John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and President his first few months with the firm were rough- major customers threatened to dumb the firm some products were behind schedule and were of poor quality; executives had to be fired for breaking company  rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. what sort leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?


4. CA has been hit with numerous scandals since the late 1990's. these scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on this distractions. compare the revenue growth and stock price of CA to that of some of its competitors over the period 2004-2008 (be sure to use CA's corrected figures!) can you detect any impact of these scandals on CA's performance? what else might explain the difference in performance?


Discussion Questions


1. Identify at least two other companies that mange their suppliers in a 
manner similar to Dell computers. Do these companies have anything in 
common with Dell?


2. Can you identify any disadvantages for dell in taking the approach to 

managing suppliers?


3. Do you think that this approach to managing suppliers is unethical, or is it 

acceptable and ethical? Explain your reasoning.


4. Would you recommend any changes to the way Dell manages suppliers? 

Defend your position.




Discussion Questions


1. Discuss how a CIO might handle Schrage's Scenarios using the suggested process for ethical decision making presented in this chapter.


2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage's scenarios.


3. Must businesses choose between good ethics and financial benefits? explain your answer using Schrage's scenarios as example. 

Friday, April 13, 2012

What takes you be an IT Professional?



To be an It Professional we should have the value "Discipline" so that in any obstacle that comes to
our life we can solve that problem without any delay. We also need concentration and knowledge
so that we can face any questions that will be asked by our fellow IT colleagues. Master our all
subjects that relates in our field so that we can face the problems in the future. Always interact
people so we that we can also gain any knowledge in them. Always train any programming language
to master our skill in programming. IT Professionals should performs a variety of functions that ranges from installing applications to designing complex computer networks and information databases. A few of the duties that IT professionals perform may include data management, networking, engineering computer hardware, database and software design, as well as management and administration of entire systems. Information technology is starting to spread further than the conventional personal computer and network technologies, and more into integrations of other technologies such as the use of cell phones, televisions, automobiles, and more, which is increasing the demand for such jobs. It Professionals should manage technology and spans a wide variety of areas that include computer softwareinformation systems,computer hardwareprogramming languages but are not limited to things such as processes, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy: business process automation, providing information, connecting with customers, and productivity tools.