Pages

Sunday, May 6, 2012

Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?


It will help reduced the power consumption of every computer and it is eco-friendly to use.

                                              -----------------------------------------

2. Which approach can yield greater benefits—building greener computers or implementing
programs that change users’ behavior so that they operate their computers in a more responsible
manner? Explain your response.


I think both because this two will help not just for human but also to Mother Nature to lessen the carbon emissions.

                                              -----------------------------------------

3. Do research at the EPEAT Web site and determine which computer manufacturer currently
has the best green computing ratings.



Lenovo has taken a major leap forward in green computing across multiple areas including eco-friendly material selection, energy efficiency, product packaging, product end-of-life disposal and product recycling. Lenovo is also working hard to reduce its own environmental impact while providing environmentally-responsible, energy-efficient technology choices to the world’s PC users.

http://shop.lenovo.com/ISS_Static/WW/EMEA/merchandising/sitelets/Lenovo-Green/en/Green-White_paper_ONLINE.pdf

                                              -----------------------------------------

Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave
ethically?



Through an effective spy.

                                              -----------------------------------------


2. What responsibility does an organization have to ensure that its suppliers and business
partners behave ethically?


The responsibility of trustworthy to any suppliers and business.

                                              -----------------------------------------

Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s

1. Some observers believe that if an organization does not respond to an attack on its brand
within the first 24 hours, then the damage has been done—lack of management response
is judged as an admission of guilt. Others feel that some time is required to gather facts and
figure out what happened before responding. With the advantage of 20/20 hindsight, how
might Domino’s have reacted more effectively?


Domino’s were not so updated with regards to the social media have. They just found out with someone commented on their blog. The damage has been totally done. And customers who viewed the posted video eventually alarm and decided not to eat pizza at Domino’s. As the issues have been on air their response and apology are already too late.

                                              -----------------------------------------

2. Do you find it unusual that Domino’s response was primarily through the online media rather
than the usual printed press releases? Does this seem an effective and appropriate way to
respond under these circumstances? Why or why not? Does Domino’s use of the online
media set a precedent for others to follow in the future?


Yes, it is powerful way to response through the use of online media were do their customer and people nowadays are always updated. Yes it is effective and appropriate way to responds like were this thing started. Maybe it will help do to get back what damage is done to them.

                                              -----------------------------------------

3. Identify three lessons that other companies could learn from Domino’s experience.


First always be updated thru want is happening to your surroundings, then response as early as you could when uncertain issues happened and check how liable and honest your employees to your company. 

                                              -----------------------------------------

Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real
time. Do the events in Iran illustrate the potential value to society of social networking tools
such as Twitter? Are there other ways that Twitter and other social networks could be used
by people and organizations to add real value?



No, because Iranians uses it for protesting their employers.


                                              -----------------------------------------

2. How trustworthy is the information one gleans from social networks such as Twitter?

No, you can't trust anything from any social networking sites like Twitter.

                                              -----------------------------------------


Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the
kinds of healthcare services available to the wealthy and the poor in the United States?


Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity...

 
                                              -----------------------------------------

2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?


They should be if they can handle various issues regards to developing telemedicine, and somehow only few certain people can afford it that may lead to closure of investment.

                                              -----------------------------------------

3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions?



Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.
                                              -----------------------------------------

Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide

1. How important is access to ICT in children’s education?

Children are less likely to be intimidated by, or afraid of ICT than are most adults. They often approach ICT with keenness and curiosity and thus, may quickly become adept at operating the technology. Therefore, if managed effectively, it may be seen as a suitable and motivating tool for teaching and learning

http://www.dorset.rmplc.co.uk/tanvq/Why%20is%20ICT%20important%20for%20children_files/frame.htm



                                              -----------------------------------------

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?


To be educated and make it as a good example to be assure that children also adopt knowledge as how they grow, developing the skills and finding a way to be progress in learning.


                                              -----------------------------------------

Chapter 7 - Case Study 3: Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the
Patriot software to avoid the problems that led to the loss of life? Do you think these steps
would have improved the Patriot’s effectiveness enough to make it obvious that the missile
was a strong deterrent against the Scud? Why or why not?



Maybe they should double check their program first, so that it will be successful and may not lead to loss of life.

                                              -----------------------------------------


2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot
missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?


They will just stay as friends as possible.

                                              -----------------------------------------


3. What key lessons from this example of safety-critical software development could be applied
to the development of business information system software?


They should check first that their missiles would launch in the place that it would be.

                                              -----------------------------------------


Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road

1. Is this example of software problems holding up the introduction of a major new product and
impacting a firm’s customers and suppliers unusual, or is it a common occurrence?


Yes....

                                              -----------------------------------------


2. What can organizations do to reduce the negative consequences of software development
problems in the production of their products and the operation of their business processes
and facilities?


They should double check first so that it will not cause any delays.

                                              -----------------------------------------

Chapter 6 - Case Study 3: Lotus v. Borland

1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.


As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.

                                              -----------------------------------------


2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?


The spreadsheet will not be as popular before. Lotus 1-2-3 will be as popular as it would be.

                                              -----------------------------------------


3. Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?


Qauttro will be popular and will let people to try first Quattro.

                                              -----------------------------------------


Chapter 6 - Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?


Yes, because RIAA just stand for what they think that is right.

                                              -----------------------------------------


2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a
negative impact on the ISP?


No, it will not affect the ISP.

                                              -----------------------------------------

Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.




Global Network Initiative Gets an Inside Look at Tech Firms’ Human Rights Practices.
On April 18, the Global Network Initiative (GNI) released its annual report documenting third-party assessments conducted in 2011 and 2012 for GNI’s three founding corporate participants: Google, Yahoo! and Microsoft. GNI was formed to bring major Internet companies together with human rights organizations to improve practices around human rights, privacy and freedom of expression on the Internet. In the past year, GNI expanded to include two more corporate participants—Evoca and Websense—and Facebook have recently joined the organization as an observing member. GNI has also added seven new non-corporate members—NGOs and investors from all over the world.


                                              -----------------------------------------


2. What reasons might a firm give for joining and supporting EFF?



The EFF intention is good in terms of protection of fundamental civil liberties relating to use of technology and free speech, privacy, innovation and consumer right which is definitely most individual wanted. Their advocacy to help people was good which might be the reason of firm support it.

                                              -----------------------------------------


3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?


Yes, this foundation is a nonprofit, international advocacy. It is good to help them in their goals to help other people. It is also a marketing strategy for the company to be a part of being a subject welfare corporate sponsor of this advocacy.

                                              -----------------------------------------
 

Chapter 5 - Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

No, sexting is different from the protected First Amendment Rights.

                                              -----------------------------------------

2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?


All of us can avoid sexting if we just don't entertain those people that are bored with their life.

                                              -----------------------------------------

Chapter 4 - Case Study 3: Is Google Watching You?

1. How does Google’s business model use personal data?

Google is firmly committed to the privacy of our advertisers and users. While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics.

                                              -----------------------------------------

2. What do you think are the major privacy concerns raised by Google’s business model and
applications?


The major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it

                                              -----------------------------------------

3. Do you think Google has taken adequate measures to protect its users’ privacy? Explain
your answer.


Yes, that is the role of Google as a search engine. I think the personal data of a particular person cannot be access anytime.

                                              -----------------------------------------

Chapter 4 - Vignette: Privacy Concerns Abound with New IRS Systems

1. What information about you is being held, who is holding it, and what is this information
being used for?




So far there is no information about me being held.


                                              -----------------------------------------

2. What measures are being taken to safeguard this information, and what happens if it is
inadvertently disclosed or deliberately stolen?



Better to keep your information to yourself only that it will be safe.

                                              -----------------------------------------

Chapter 3 - Case Study 3: Whistle-Blower Divides IT Security Community

1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?







In the end, the researcher, Michael Lynn, went ahead with a presentation, describing flaws in Cisco's software that he said could allow hackers to take over corporate and government networks and the Internet, intercepting and misdirecting data communications. Mr. Lynn, wearing a white hat emblazoned with the word "Good," spoke after quitting his job at Internet Security Systems Inc. Wednesday. Mr. Lynn said he resigned because ISS executives had insisted he strike key portions of his presentation.
 
                                                      http://www.scheier.com/blog/archive/2005/07/cisco_harasses.html

                                              -----------------------------------------

2. Do you think that Cisco and ISS were right to pull the plug on Lynn’s presentation at the
Black Hat conference? Why or why not?


have searched an interview forum which Lynn said: I was very specifically told... It was January 26th and Cisco had just announced a totally different vulnerability than the once I demonstrated, They'd announced a vulnerability for something called "Multiple Crafted IPv6 Packets Cause Router Reload" (as they worded it in their patch message). But that's a very vague term. It just says, "Hey, something is wrong in IP6 with the router reload" ... but it didn't say you could be in control of it. ISS wanted to get some more details fot it ... and Cisco wouldn't give (the information) to them. So (ISS manager) came to me and said, "Can you reverse-engineer ... can you disassemble IOS ... to find out what their vulnerability is?
                               http://www.wired.com/politics/security/new/2005/08/68365?currentPage=all

                                               -----------------------------------------


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that
would have led to the problem being promptly addressed without stirring up animosity among
the parties involved.


    When Mike Lynn discovered that is was possible to create a network worm that could propagate itself as it attacked and took control of routers across the internet.



                                               -----------------------------------------

Chapter 3 - Vignette: Trading Scandal at Société Générale

 1. Peter Gumble, European editor for Fortune magazine, comments, “Kerviel is a stunning
example of a trader breaking the rules, but he’s by no means alone. One of the dirty little
secrets of trading floors around the world is that every so often, somebody is caught concealing
a position and is quickly—and quietly—dismissed…. [This] might be shocking for people
unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider
this: the only way banks can tell who will turn into a good trader and who won’t is by giving
every youngster it hires a chance to show his mettle. That means allowing even the most
junior traders to take aggressive positions. This leeway is supposed to be matched by
careful controls, but clearly they aren’t foolproof.”11 What is your reaction to this statement
by Mr. Gumble?


  When first starting to trade, you need to manage risk and to trade a well defined trading plan with clearly specified entry and exit strategies. You need a detailed risk management plan and a detailed money management plan. No building is built without a plan. Why would you attempt to trade without a detailed trading plan? Often the reason is that novice traders want to believe that a charting program or a trading program in itself will give them unlimited money.




                                              -----------------------------------------

2. What explanation can there be for the failure of SocGen’s internal control system to detect
Kerviel’s transactions while Eurex detected many suspicious transactions?


  Within the framework of this fraud the financial instruments of portfolio (A) were seemingly compensated with the fictitious operations accommodated within portfolio (B) which showed only a very little residual risk. He gave to his fictitious operations some characteristics which limited the opportunities of control. He usurped computing access codes belonging to operators to cancel certain operations. He falsified the documents allowing him to justify his fictitious operations. He made sure that his fictitious operations related to a financial instrument different from those which he had just canceled to avoid control.

                                              -----------------------------------------

Wednesday, April 18, 2012

Chapter 2 - Case Study 3: When Certification Is Justified

1. What actions should WMI have taken to lessen the risk of this project and avoid these
problems?





                                              -----------------------------------------

2. What sort of losses has WMI incurred from the delay of this project? How has the lack of success
on this project affected SAP?






                                              -----------------------------------------

3. Do research on the Web to find out the current status of the lawsuits between WMI and SAP.
Write a brief report summarizing your findings.

Chapter 2 - Vignette: IT Technicians Fired After Reporting Child Porn

1. What message is sent to IT workers by the actions of New York Law School and Collegis—
even if unrelated job-performance issues justified their actions in firing Gross and Perry?


                                              -----------------------------------------

2. Since this incident, a number of states have enacted laws that require workers to report
immediately any child pornography found while servicing equipment. Most of the laws state
that a worker who reports such a discovery is immune from any criminal, civil, or administrative
liability. Failure to report the discovery can result in a fine, imprisonment, or both. Do you
think such laws will encourage reporting? Why or why not?



Chapter 1 - Case Study 3: Is There a Place for Ethics in IT?

1. Discuss how a CIO might handle Schrage’s scenarios using the suggested process for ethical
decision making presented in this chapter.

In the article, Schrage provided a few scenarios to back up his opinion. In one such example,
a company is developing a customer relationship management (CRM) system, and the staff is
working very hard to meet the deadline. The company plans to outsource the maintenance and
support of the CRM system once it is developed, meaning that there is a good chance that
two-thirds of the IT staff will be laid off. Would you disclose this information? Schrage answered,
“I don’t think so.”
In another scenario, Schrage asked readers if they would consider deliberately withholding
important information from their boss if they knew that its disclosure would provoke his or her
immediate counterproductive intervention in an important project. Schrage said he would withhold
it. Business involves competing values, he argued, and trade-offs must be made to keep business
operations from becoming paralyzed.

                                              -----------------------------------------
 

2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions
for each of Schrage’s scenarios.

The possible short-term losses would be the two-thirds of the IT staff will be laid off. And the long-term gains would benefit to the company.


                                              -----------------------------------------
 

3. Must businesses choose between good ethics and financial benefits? Explain your answer
using Schrage’s scenarios as examples.

Yes, because as Michael Schrage choose to handle all those scenarios being presented in the chapter. He chooses good ethics among his co-workers and financial benefits to their company.

Chapter 1 - Vignette: Dubious Methods Used to Investigate Leaks by Hewlett-Packard Board Members

1. Which issue is more disconcerting—the fact that a board member leaked confidential information
about the firm or the tactics used to investigate the leak? Defend your position.

Yes, because one or more board members of leaking information about HP’s long-term strategy to
the news media. As part of the HP company one member should not leak the information of their long-term strategy as a sign of respect that you belong in that certain company.

                                              -----------------------------------------

2. Can the use of pretexting to gain information ever be justified? Is it considered legal under
any circumstances?

No, because pretexting - the use of false pretenses—to gain access to the telephone records of HP directors, certain employees, and nine journalists. Pretexting is not considered legal in any circumstances because one is using a false pretenses just to gain access to the records of HP directors, certain employees, and nine journalists.


Monday, April 16, 2012

Chapter 2 - Case Study 1: Google Named in $1 Billion Trade Secret Lawsuit

1. This incident illustrates some of the potential problems for small software developers working with giant software  anufacturers to extend or enhance their products. Provide two good reasons why small developers should still  consider working closely with large software firms.

The two good reasons why small software developers should still consider working closely with large software firms are first is to extend or enhance their products and skills in developing software, second; so that their business will grow.

                                              -----------------------------------------
 
2. What measures could LimitNone have taken to better protect itself from Google’s alleged actions? What measures could Google have taken to protect itself from this lawsuit?

As the owner of the organization, you’ll do every  thing that would protect your business from the competitors even if whatever it takes. LimitNote have taken better measures and strategies to better protect itself from Google’s alleged actions. They hide some of their vital information that might be stolen from other business organizations. Same as well to Google, that protects itself also from this lawsuit.

                                              -----------------------------------------

3. Do research on the Web to find out how this case is proceeding in the courts. Write a short summary of your findings.

Every business organization possesses its own objectives, but there are also in common. The most common among all are: to help or provide service to numerous users with the use of information; and to earn something or many things from it. Each and every one of them must take respect from each other and to all of their competitors even if they provide services in common, the more important is that they helped.

Chapter 1 - Case Study 1: Computer Assoicates: A Firm with Scandal-Riddled Past

1. CA executives involved in the accounting scandal were not accused of reporting bogus contracts or hiding major problems in the business. The contracts that were backdated were real sales agreements. Was this really a crime? Should the individuals have been punished so harshly?

Yes, it was stated that if Honeycutt will not take the offer and the Computer Associates executives threatened that they will wrongly harm CSC and was proven guilty. It is indeed a serious offense and the individuals will be punished as what the court agreed according to their cases.

                                              -----------------------------------------

2. In December 2004, CA appointed Patrick J. Gnazzo as senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically. Gnazzo served in this role at United Technologies for 10 years and had been a member of the board of directors of the Ethics Officers Association. Gnazzo reported to a new executive vice president and general counsel at CA as well as the board’s Compliance Committee. Outline some of the actions Gnazzo might have taken in his first six months on the job.

In the first six months on the job of Patrick J. Gnazzo, as appointed senior chief compliance officer, he should be the model to the right things for the good of their company he should ensure the ethical procedures are consistently adhered throughout the organization. It is said that Gnazzo has to demonstrate to the government and shareholders that the firm would take measures to operate ethically, and then he has to do something or many things for his role.

                                              -----------------------------------------

3. John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and president. His first few months with the firm were rough—major customers threatened to dump the firm; some products were behind schedule and were of poor quality; executives had to be fired for breaking company rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. What sort of leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?

A great leader has to take initiative, that’s the possible thing that John Swainson demonstrated to show that he was determined to avoid future scandals at CA.

                                              -----------------------------------------

4. CA has been hit with numerous scandals since the late 1990s. These scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on these distractions. Compare the revenue growth and stock price of CA to that of some of its competitors over the time period 2004–2008. (Be sure to use CA’s
corrected figures!) Can you detect any impact of these scandals on CA’s performance? What else might explain the difference in performance?

There is a great impact of those scandals on CA’s performance, for how it will recover and improve while it is undergoing big problems and issues that taking it drive down. The thing that might explain the difference in performance is all about what has done by the executive of the business.

Thursday, April 12, 2012

What takes to be an IT Professional?




To be an IT professional, you must know what the expectations of your colleagues, your industry, your clients and the general public are. Meeting these expectations is what qualifies you to call yourself a professional, and what gives you recognition as a professional. In today’s world the role of the IT professional is crucial.