Pages

Sunday, May 6, 2012

Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?


It will help reduced the power consumption of every computer and it is eco-friendly to use.

                                              -----------------------------------------

2. Which approach can yield greater benefits—building greener computers or implementing
programs that change users’ behavior so that they operate their computers in a more responsible
manner? Explain your response.


I think both because this two will help not just for human but also to Mother Nature to lessen the carbon emissions.

                                              -----------------------------------------

3. Do research at the EPEAT Web site and determine which computer manufacturer currently
has the best green computing ratings.



Lenovo has taken a major leap forward in green computing across multiple areas including eco-friendly material selection, energy efficiency, product packaging, product end-of-life disposal and product recycling. Lenovo is also working hard to reduce its own environmental impact while providing environmentally-responsible, energy-efficient technology choices to the world’s PC users.

http://shop.lenovo.com/ISS_Static/WW/EMEA/merchandising/sitelets/Lenovo-Green/en/Green-White_paper_ONLINE.pdf

                                              -----------------------------------------

Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave
ethically?



Through an effective spy.

                                              -----------------------------------------


2. What responsibility does an organization have to ensure that its suppliers and business
partners behave ethically?


The responsibility of trustworthy to any suppliers and business.

                                              -----------------------------------------

Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s

1. Some observers believe that if an organization does not respond to an attack on its brand
within the first 24 hours, then the damage has been done—lack of management response
is judged as an admission of guilt. Others feel that some time is required to gather facts and
figure out what happened before responding. With the advantage of 20/20 hindsight, how
might Domino’s have reacted more effectively?


Domino’s were not so updated with regards to the social media have. They just found out with someone commented on their blog. The damage has been totally done. And customers who viewed the posted video eventually alarm and decided not to eat pizza at Domino’s. As the issues have been on air their response and apology are already too late.

                                              -----------------------------------------

2. Do you find it unusual that Domino’s response was primarily through the online media rather
than the usual printed press releases? Does this seem an effective and appropriate way to
respond under these circumstances? Why or why not? Does Domino’s use of the online
media set a precedent for others to follow in the future?


Yes, it is powerful way to response through the use of online media were do their customer and people nowadays are always updated. Yes it is effective and appropriate way to responds like were this thing started. Maybe it will help do to get back what damage is done to them.

                                              -----------------------------------------

3. Identify three lessons that other companies could learn from Domino’s experience.


First always be updated thru want is happening to your surroundings, then response as early as you could when uncertain issues happened and check how liable and honest your employees to your company. 

                                              -----------------------------------------

Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real
time. Do the events in Iran illustrate the potential value to society of social networking tools
such as Twitter? Are there other ways that Twitter and other social networks could be used
by people and organizations to add real value?



No, because Iranians uses it for protesting their employers.


                                              -----------------------------------------

2. How trustworthy is the information one gleans from social networks such as Twitter?

No, you can't trust anything from any social networking sites like Twitter.

                                              -----------------------------------------


Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the
kinds of healthcare services available to the wealthy and the poor in the United States?


Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity...

 
                                              -----------------------------------------

2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?


They should be if they can handle various issues regards to developing telemedicine, and somehow only few certain people can afford it that may lead to closure of investment.

                                              -----------------------------------------

3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions?



Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.
                                              -----------------------------------------

Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide

1. How important is access to ICT in children’s education?

Children are less likely to be intimidated by, or afraid of ICT than are most adults. They often approach ICT with keenness and curiosity and thus, may quickly become adept at operating the technology. Therefore, if managed effectively, it may be seen as a suitable and motivating tool for teaching and learning

http://www.dorset.rmplc.co.uk/tanvq/Why%20is%20ICT%20important%20for%20children_files/frame.htm



                                              -----------------------------------------

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?


To be educated and make it as a good example to be assure that children also adopt knowledge as how they grow, developing the skills and finding a way to be progress in learning.


                                              -----------------------------------------

Chapter 7 - Case Study 3: Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the
Patriot software to avoid the problems that led to the loss of life? Do you think these steps
would have improved the Patriot’s effectiveness enough to make it obvious that the missile
was a strong deterrent against the Scud? Why or why not?



Maybe they should double check their program first, so that it will be successful and may not lead to loss of life.

                                              -----------------------------------------


2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot
missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?


They will just stay as friends as possible.

                                              -----------------------------------------


3. What key lessons from this example of safety-critical software development could be applied
to the development of business information system software?


They should check first that their missiles would launch in the place that it would be.

                                              -----------------------------------------


Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road

1. Is this example of software problems holding up the introduction of a major new product and
impacting a firm’s customers and suppliers unusual, or is it a common occurrence?


Yes....

                                              -----------------------------------------


2. What can organizations do to reduce the negative consequences of software development
problems in the production of their products and the operation of their business processes
and facilities?


They should double check first so that it will not cause any delays.

                                              -----------------------------------------

Chapter 6 - Case Study 3: Lotus v. Borland

1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.


As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.

                                              -----------------------------------------


2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?


The spreadsheet will not be as popular before. Lotus 1-2-3 will be as popular as it would be.

                                              -----------------------------------------


3. Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?


Qauttro will be popular and will let people to try first Quattro.

                                              -----------------------------------------


Chapter 6 - Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?


Yes, because RIAA just stand for what they think that is right.

                                              -----------------------------------------


2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a
negative impact on the ISP?


No, it will not affect the ISP.

                                              -----------------------------------------

Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.




Global Network Initiative Gets an Inside Look at Tech Firms’ Human Rights Practices.
On April 18, the Global Network Initiative (GNI) released its annual report documenting third-party assessments conducted in 2011 and 2012 for GNI’s three founding corporate participants: Google, Yahoo! and Microsoft. GNI was formed to bring major Internet companies together with human rights organizations to improve practices around human rights, privacy and freedom of expression on the Internet. In the past year, GNI expanded to include two more corporate participants—Evoca and Websense—and Facebook have recently joined the organization as an observing member. GNI has also added seven new non-corporate members—NGOs and investors from all over the world.


                                              -----------------------------------------


2. What reasons might a firm give for joining and supporting EFF?



The EFF intention is good in terms of protection of fundamental civil liberties relating to use of technology and free speech, privacy, innovation and consumer right which is definitely most individual wanted. Their advocacy to help people was good which might be the reason of firm support it.

                                              -----------------------------------------


3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?


Yes, this foundation is a nonprofit, international advocacy. It is good to help them in their goals to help other people. It is also a marketing strategy for the company to be a part of being a subject welfare corporate sponsor of this advocacy.

                                              -----------------------------------------
 

Chapter 5 - Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

No, sexting is different from the protected First Amendment Rights.

                                              -----------------------------------------

2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?


All of us can avoid sexting if we just don't entertain those people that are bored with their life.

                                              -----------------------------------------

Chapter 4 - Case Study 3: Is Google Watching You?

1. How does Google’s business model use personal data?

Google is firmly committed to the privacy of our advertisers and users. While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics.

                                              -----------------------------------------

2. What do you think are the major privacy concerns raised by Google’s business model and
applications?


The major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it

                                              -----------------------------------------

3. Do you think Google has taken adequate measures to protect its users’ privacy? Explain
your answer.


Yes, that is the role of Google as a search engine. I think the personal data of a particular person cannot be access anytime.

                                              -----------------------------------------

Chapter 4 - Vignette: Privacy Concerns Abound with New IRS Systems

1. What information about you is being held, who is holding it, and what is this information
being used for?




So far there is no information about me being held.


                                              -----------------------------------------

2. What measures are being taken to safeguard this information, and what happens if it is
inadvertently disclosed or deliberately stolen?



Better to keep your information to yourself only that it will be safe.

                                              -----------------------------------------

Chapter 3 - Case Study 3: Whistle-Blower Divides IT Security Community

1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?







In the end, the researcher, Michael Lynn, went ahead with a presentation, describing flaws in Cisco's software that he said could allow hackers to take over corporate and government networks and the Internet, intercepting and misdirecting data communications. Mr. Lynn, wearing a white hat emblazoned with the word "Good," spoke after quitting his job at Internet Security Systems Inc. Wednesday. Mr. Lynn said he resigned because ISS executives had insisted he strike key portions of his presentation.
 
                                                      http://www.scheier.com/blog/archive/2005/07/cisco_harasses.html

                                              -----------------------------------------

2. Do you think that Cisco and ISS were right to pull the plug on Lynn’s presentation at the
Black Hat conference? Why or why not?


have searched an interview forum which Lynn said: I was very specifically told... It was January 26th and Cisco had just announced a totally different vulnerability than the once I demonstrated, They'd announced a vulnerability for something called "Multiple Crafted IPv6 Packets Cause Router Reload" (as they worded it in their patch message). But that's a very vague term. It just says, "Hey, something is wrong in IP6 with the router reload" ... but it didn't say you could be in control of it. ISS wanted to get some more details fot it ... and Cisco wouldn't give (the information) to them. So (ISS manager) came to me and said, "Can you reverse-engineer ... can you disassemble IOS ... to find out what their vulnerability is?
                               http://www.wired.com/politics/security/new/2005/08/68365?currentPage=all

                                               -----------------------------------------


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that
would have led to the problem being promptly addressed without stirring up animosity among
the parties involved.


    When Mike Lynn discovered that is was possible to create a network worm that could propagate itself as it attacked and took control of routers across the internet.



                                               -----------------------------------------

Chapter 3 - Vignette: Trading Scandal at Société Générale

 1. Peter Gumble, European editor for Fortune magazine, comments, “Kerviel is a stunning
example of a trader breaking the rules, but he’s by no means alone. One of the dirty little
secrets of trading floors around the world is that every so often, somebody is caught concealing
a position and is quickly—and quietly—dismissed…. [This] might be shocking for people
unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider
this: the only way banks can tell who will turn into a good trader and who won’t is by giving
every youngster it hires a chance to show his mettle. That means allowing even the most
junior traders to take aggressive positions. This leeway is supposed to be matched by
careful controls, but clearly they aren’t foolproof.”11 What is your reaction to this statement
by Mr. Gumble?


  When first starting to trade, you need to manage risk and to trade a well defined trading plan with clearly specified entry and exit strategies. You need a detailed risk management plan and a detailed money management plan. No building is built without a plan. Why would you attempt to trade without a detailed trading plan? Often the reason is that novice traders want to believe that a charting program or a trading program in itself will give them unlimited money.




                                              -----------------------------------------

2. What explanation can there be for the failure of SocGen’s internal control system to detect
Kerviel’s transactions while Eurex detected many suspicious transactions?


  Within the framework of this fraud the financial instruments of portfolio (A) were seemingly compensated with the fictitious operations accommodated within portfolio (B) which showed only a very little residual risk. He gave to his fictitious operations some characteristics which limited the opportunities of control. He usurped computing access codes belonging to operators to cancel certain operations. He falsified the documents allowing him to justify his fictitious operations. He made sure that his fictitious operations related to a financial instrument different from those which he had just canceled to avoid control.

                                              -----------------------------------------