Tuesday, May 15, 2012

Chapter 10 Case Study

Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave ethically?
Answer:
 ... and agile Supply Chain ... communicate its role to other departments in the company. Ensure that all Purchasing transactions are conducted ethically ...
Reference: http://www.weegy.com/?ConversationId=39FF2717
2.What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
Answer:
 There is no longer one agreed moral code. Most people have a weak sense of religion or none at all. So their morals must come from somewhere else.
reference: http://tutor2u.net/business/external/ethics_modern.htm
Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing
1. How have green computing efforts lowered the total cost of computer ownership?
Answer:
As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. [ Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels. As an example, each node of Supermicro's SuperBlade? can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade? can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees. ]
Reference: http://www.weegy.com/?ConversationId=9E58ADE5
2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
Answer:
For me, implementing programs that change users' behavior so that they can operate computers more responsible in a manner way because they are lot of programs helping others to be more responsible.
3.Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 
Answer:
 Yes, the study and practice of designing, manufacturing, using, and disposing of computers, servers, and associated subsystems—such as monitors, printers, storage devices, and networking and communications systems — efficiently and effectively with minimal or no impact on the environment.

Chapter 9 Case Study

Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters
1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
Answer:
 Twitter is owned by the company called Obvious. They don't have many products, just Twitter. They operate a blog. [ It was opened publicly in July 2006 and its their only international product currently.

REFERENCE: http://www.weegy.com/?ConversationId=65879100

2. How trustworthy is the information one gleans from social networks such as Twitter?
Answer:
Twitter is owned by the company called Obvious. They don't have many products, just Twitter. They operate a blog.  It was opened publicly in July 2006 and its their only international product currently.
Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
Answer:
the domino of the company must react effective by reacting immediately to the scandal made by one of the employee, they must respond quickly because the company image will affected especially when the video was scattered and same of the customer were less likely to do so after seeing the video. although it is a joke and not true, but then the mind of the customers were easily be turn off, therefore there must be and action be taken such as press released and apologize immediately to the people what was really happened.     
2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
Answer:

3. Identify three lessons that other companies could learn from Domino’s experience.
Asnwer

Chapter 8 Case Study

Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide


1. How important is access to ICT in children’s education?
Answer:

It is important because ICT is living life easier but children must be guided by elders for the reason of not abusing theirselves in using it.

2.What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?
Asnwer:
Money.

Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1.Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Answer:
 Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity...

reference: http://www.weegy.com/?ConversationId=91CA1D2F
2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?
Answer:
Yes they should , we all pay our bills to health care but not have improved service.
3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?
Answer:
 Drawbacks of telemedicines are that they can be expensive and may or may not be completely covered by every insurer. Demand of telemedicine is pretty high as well. Situations where telemedicine might not be useful might be to the elderly.

Chapter 7 Case Study

Chapter 7  Vignette: Boeing Dreamliner Faces a Few Bumps in the Road


1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Answer:
Not all software products are damage or have defects because if they supply their products with negative issues they can be sued.

2.What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:
As an organization develops plans and strategies to deal with the opportunities and challenges that arise in its particular operating environment, it should design a system that is capable of producing quality services and goods in demanded quantities in acceptable time frames.


Chapter 7 Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
Asnwer:
Yes, because it is more effective in some aspects of other missile.

2.What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
Answer:
For me, the U.S. military made a mistake because they lost many lives when they deployed in the said area.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Answer:

  I think the process of being developing safely. It should be secure the integrity and constraints.

Chapter 6 Case Study

Chapter 6 - Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?
Answer:

The Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies. Its members are the music labels that comprise the most vibrant record industry in the world. RIAA® members create, manufacture and/or distribute approximately 85% of all legitimate recorded music produced and sold in the United States.
In support of this mission, the RIAA works to protect the intellectual property and First Amendment rights of artists and music labels; conduct consumer, industry and technical research; and monitor and review state and federal laws, regulations and policies. The RIAA® also certifies Gold®, Platinum®, Multi-Platinum™ and Diamond sales awards as well as Los Premios De Oro y Platino™, an award celebrating Latin music sales.
 
 
2. Could an ISP’s implementation and enforcement of the RIAA’s multi tier strategy have a
negative impact on the ISP?
Answer:

yes, it is a big impact for ISP. ISP cannot earn money for this strategy.


Chapter 6 - Case Study 3: Lotus v. Borland


1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

Answer:
I am more comfortable using Excel because it has a lot of function and friendly user program.

2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?
Asnwer:
In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3.Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?
Answer:
If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an investigation in court you are assuredly obliged to face the court as a managerin your company and aside to face the court you will be put in prison..

Chapter 5 Case Study

Vignette: Sexting 
1. Does sexting represent a form of expression that is protected by the First Amendment?
Answer:
Neither the Supreme Court nor, apparently, any other court has yet ruled on this question. There are, however, several things that can be said:
First, if the particular sexting is legally "obscene," then the First Amendment does not protect it. The state and Federal laws that prohibit obscene materials would therefore apply. Today, however, obscenity prosecutions are extremely rare, partly because it is so hard to prove that sexual material is legally "obscene" under applicable "community standards."
Second, and probably more importantly, sexually explicit pictures of persons under 18 are not generally entitled to constitutional protection because of the "child pornography" exception to the First Amendment. Therefore, many believe that anyone who produces such pictures of minors (including pictures taken by teens of themselves) would be outside the protection of the First Amendment and subject to prosecution. The same is true of anyone who knowingly receives, distributes or possesses pictures of minors engaged in sexually explicit conduct (included lascivious exposure).
However, it is not a foregone conclusion that sexting is actually "child pornography" for constitutional purposes. The Supreme Court has recently said it is only when pictures are made by people exploiting children that they are outside the First Amendment (Ashcroft v. Free Speech Coalition). If the Supreme Court adheres to this precedent, then sexting by teens on their own initiative should be protected under the Constitution as long as it is not legally obscene.


2.What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?
Asnwer:
People must be vigilant on sexting, they must be responsible to keep in safe.
Case Study 3: The Electronic Frontier Foundation

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.

Answer:

2.What reasons might a firm give for joining and supporting EFF?
 Answer:

Wednesday, May 2, 2012

Chapter 4 Case Study

DISCUSSION QUESTIONS


1. What type of security breaches of medical record are commonly today?
-Nowadays, the most common type of security breaches of medical record is when the computer or hard disk was stolen along with it the patients file.


2. What measures are being taken by the government and private industry to safeguard EHR's?
-The government has the  Health Insurance Portability and Accountability Act (HIPAA), which is an act to protect the confidentiality of the healthcare user and data.
3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
-ARRA has some issues regarding the privacy of the users health care and data.The security of the users data should always be considered.

DISCUSSION QUESTIONS

1. How does Google's business model use personal data?
Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ] 


2. What do you think are the major privacy concerns raised by Google's business model and applications?
-the major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it.


3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
-I think if you care about your privacy, don't put your data on Google .
Google policy is to get right up to the creepy line and not cross it… We don’t need you to type at all. We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.” - Eric Schmidt, former chief executive of Google, October 1st, 2010