Wednesday 9 May 2012


Chapter 10Problem with suppliers

Questions to Consider

1. How can an organization ensure that all the members of its supply chain will behave ethically?
- For the Organization to ensure that all the member of the supply chain will behave ethically in the way that the member pay properly and not taking advantage that they are a member of your Organization.
2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
- They should always have a good deal with the product and properly discussed the rules clearly.

Manufacturers Compete on Green Computing

Questions to Consider

1. How have green computing efforts lowered the total cost of computer ownership?
As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. [ Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels. As an example, each node of Supermicro's SuperBlade® can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade® can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees.
Source: http://www.weegy.com/?ConversationId=8D859AA5

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
-For me both are have benefits on building greener computers it helps more in our environment to prevent pollutions and in implementing programs it also give benefits to the people so that they will now how to use the computer properly and not to abuse using the computer.

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 
-As I see it’s the APPLE is in top rating.

Chapter 9:  Twitter Emerges as News Source  for Iran protesters

Questions to Consider

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?.
-There seems to be a backlash about the important place social media has in our lives. People such as Malcolm Gladwell have written extensively that the value of Facebook and Twitter is overblown when it comes to creating social change.
Much of Gladwell’s reasoning is flawed, but his pessimism does force us to be clearer about our goal with social media. For those of us looking to make a difference though activism campaigns, Gladwell is right that the challenge is to build and mobilize online communities rather than simply make noise. During a Social Media Week event, The Yes Men co-founder Andy Bichlbaum compared social media tools to the phone trees that spurred people to action in the 1960s. The telephone has played a big role in information sharing over the years, but we don’t hold the telephone accountable for the lack of social activism the way Gladwell and others blame Facebook for societal apathy. In real life it can be our nature to be passive, and it should come as no surprise that we can be the same way on Facebook. That is, it’s easy to “like” a cause on Facebook, but it is a much bigger lift to donate money, show up at a rally and vote on Election Day. As Naomi Hirabayshi of DoSomething.org put it, real change in social entrepreneurship takes place offline, but word of mouth (and its online equivalent, which is social networking) is the best way to share trusted information.

2. How trustworthy is the information one gleans from social networks such as Twitter?
Walther and Parks (2002), responding to theoretical developments in CMC, proposed that a primary goal of interpersonal relationships is to add connectedness (or “warrant”) to relationships. They believed that the highest-value warranting information was that perceived to be most free from manipulation, i.e. provided by other people. More recently, Walther, Heide, Hamel, and Shulman (2009) applied the warranting hypothesis to Facebook, a type of social network site (boyd, 2007). In support of their primary hypothesis, they found that individuals warranting another person’s profile were more likely to evaluate that person’s attractiveness and extroversion based on comments left by others than by information that person provided. The study stipulated that a warranting effect would be present in the initial stages of a relationship that starts online and moves offline.

Social Networking Disasters for Dominos

Questions to Consider

1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?.

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

-For me the most effective way is through online , because as you observe now a day people are more in the internet and its fast in the internet.

3. Identify three lessons that other companies could learn from Domino’s experience.
- Once they became aware (more on how long this took later), the company worked to get the videos removed from the original hosting provider (doesn’t matter, as they have since been uploaded to other sites). Dominos then responded with email communications from Tim McIntyre, Vice President of Communications. He indicated how repulsed he was, and described that their security team was going to look into the matter to identify which store and responsible individuals. The company is in damage control mode, operating reactionary during a crisis. While they are taking some of the steps you would expect a brand to do under the circumstances (like terminating the employees and filing criminal complaints with local authorities), they are still missing the opportunity to repair some of the damage done with their customers.

Chapter 8Western Cape Striving to Eliminate the Digital Divide

Question to Consider

1. How important is access to ICT in children’s education?
ICT is important in primary schools because it can help kids to achieve better results in other subjects and to find what they need and use information in particular ways. It is important that children become familiar with ICT at an early age, because they will need those skills for the remainder of their education and in adult life.

Source : http://www.ehow.com/about_6612110_importance-ict-primary-education.html

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
ICT is a global phenomenon, and children who are computer literate at an early stage of their lives might deal better with the modern world. A sound knowledge of ICT makes it much easier for children to find and organize information. An Office for Standards in Education (Ofsted) funded study (2009) that took place between 2005 and 2008 identified good practices in the teaching of ICT. Although the ICT curriculum was sometimes poorly balanced, its use contributed to children doing better in some subject areas. The study also found that the primary school children spent as much time on computers as the curriculum allowed.
Technological Advances Create Digital Divide in Health Care
Questions to Consider
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?.
-  One key opportunity is to integrate clinical service delivery with community prevention in order to reduce demand for resources and services; improve health, safety, [ and equity outcomes; and provide medical providers with skills and strategies to change the social circumstances that shape the health of their patients. Prevention Institute outlines an approach that community health centers can take to promote community health even as they deliver high quality medical services to individuals.

2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

-For me I think that they should also provide to the poor people, so that they can also benefits on the telemedicine .

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions? 
- Telemedicine is a vast subject, but as yet there are limited data on the clinical effectiveness and cost-effectiveness of most telemedicine applications. As a result, objective information about the benefits and drawbacks of telemedicine is limited. This review is therefore based mainly on preliminary results, opinions and predictions. Many potential benefits of telemedicine can be envisaged, including: improved access to information; provision of care not previously deliverable; improved access to services and increasing care delivery; improved professional education; quality control of screening programmes; and reduced health-care costs. Although telemedicine clearly has a wide range of potential benefits, it also has some disadvantages. The main ones that can be envisaged are: a breakdown in the relationship between health professional and patient; a breakdown in the relationship between health professionals; issues concerning the quality of health information; and organizational and bureaucratic difficulties. On balance, the benefits of telemedicine are substantial, assuming that more research will reduce or eliminate the obvious drawbacks.

Chapter 7: Boeing Dream liner Faces a few bumps in the road

Questions to Consider

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
- Yes, because some of the product have some defect that are not fully check by the owner of the software.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?.
-In order to reduce negative consequence of the software, they should put copyright on the product and insure that the product is in high quality and no defects when it is deliver in the customers.

Patriot Missiles Failure

Questions to Consider

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
- The steps that the developer of the Missiles should do is to check and secure that the software that will be use is correct or try testing some of the samples to make it correct.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
-As I read the issue about this they deploy the Patriot Missiles in the Israel and Saudi Arabia. Because it’s a desert and open field that they can test the missiles in that area.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?.
-The lesson that should be applied to develop the business information system software is to secure its parts and to insure it function well.

Chapter 6: RIAA fights Music Piracy

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

- I think it helps the music industry , because I help to prevent not to buy the piracy music instead of buying the original copy.

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
-I think it will not affect the ISP because it only detect the site those who are pirating.

Lotus Vs. Borland

Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

-For me the different in Excel from Borland is that, all the problems, procedures and formula needed to compute for large quantity of amount can be very easy, because it provides complete instruction for every formula and it is in its quality. I like Excel most especially that I can be able to run an Visual Basic application in Macro. But the only reason why the Borland Excel was being successful, because they just infringing the structure, commands, codes and all those stuffs according to survey, that's the reason they can gather some ideas on how to build same application more quality than the other.

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

-In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

-If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an investigation in court you are assuredly obliged to face the court as a manager in your company and aside to face the court you will be put in prison

Chapter 5 :  Sexting

Questions to Consider

1. Does sexting represent a form of expression that is protected by the First Amendment?

-  For me Sexting is not a form of expression, because it is just a text and you can’t see or feel the expression of the one you are texting.

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 
-For people will able to be protected from the danger of sexting is to avoid from texting to those people that are in this action.

The Electronic Frontier Foundation (EFF)

Questions to Consider

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why?
From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.
Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 140,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public.
EFF is a donor-funded nonprofit and depends on your support to continue successfully defending your digital rights. Litigation is particularly expensive; because two-thirds of our budget comes from individual donors, every contribution is critical to helping EFF fight—and win—more cases.

2. What reasons might a firm give for joining and supporting EFF?
-It will protect your Digital Innovators

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say? 
- If this will improve the telecommunication of  our country , I will support the program so that our communication will be faster and easier.







Wednesday 2 May 2012



Case Study: Chapter 3

Trading Scandal at Society General

Questions to Consider:

1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

- In trading you should know the person or company that you are trading and know their backgrounds for you able to know if they are safe or not. Trading also Is a way of Dealing a person thing and know if it is in good condition to be trade.

2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Significant deficiencies in internal controls, unauthorized trading activities, computer hacking and the breach of trust involving a conscious effort by the rogue trader to deceive his managers were noticed. Jérôme Kerviel is accused of creating a huge loses by a single unauthorized trader in financial history. In the course of 2007 he made unauthorized trade worth € 30 bn. on European stock market futures, winning € 1.4 bn. by the end of the year. Having disguised the importance of his exposure, and earnings, with fictitious trades, he went on in January 2008 to make even bigger trades. The bank stated that he deliberately set out to lose money in 2008 to bring down the suspicious size of his 2007 earnings.

Source http://www.hg.org/article.asp?id=6028

Whistle-Blower Divides IT Security Community

Discussion Questions and Answers:


1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

-For me Mike Lynn did not act responsible , because he lie on the people and just protect himself for him not to be fired from his work.

2. Do you think that Cisco and ISS were right to pul the plug on Lynn's presentation at the Black Hat conference? Why or why not?

-Yes, So that people will know the truth about the conference and what’s going on in that conference so that people will also have idea and opinion about it.

3. Outline a more reasonable approach toward communicating the flaw in the CIsco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.

In monitoring in regardless of the way ML was treated, I certainly hope you would have taken this corrective action. The threat is much greater now, if you don't take any new action to strengthen your systems (something you haven't done in the past), his new information MUST increase the overall risk.

Source: http://taosecurity.blogspot.com/2005/07/new-cisco-advisory-and-statements-i.html

Case Study: Chapter 4

Discussion Questions and Answer:


1. What type of security breaches of medical records are common today?

-For me Digital technology, which encompasses electronic mail, facsimile, and the Internet, is increasingly becoming the preferred means of maintaining and sharing medical records.

2. What measures are being taken by the government and private industry to safeguard EHRs?

-The measures are being taken by the government and private industry to safeguard EHR’s is to implement the health Insurance portability and accountability Act (HIPAA), commonly called the administrative simplification provisions, mandates the creation of standards to protect the confidentiality of electronic transactions within the healthcare system. The HIPAA Security Rule safeguards the confidentiality of electronic patient information. In implementing the Security Rule, the U.S. Department of Health and Human Services (HHS) regulated enforcement tasks to the Centers for Medical and Medicaid Services (CMS). CMS has the authority to interpret the provisions, conduct compliance review, and impose monetary penalties on organizations that do not comply with HIPAA security regulations. It recommends system features and practices that will help secure sensitive information in EHR’s and also begun auditing all the hospital to determine whether CMS reliance on complaints was sufficient to promote compliance with the HIPAA privacy provisions. This higher degree of control is thin the context of the electronic health record (EHR).


3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

-Base on that I have research , the ARRA have a good objectives in the community and the primary objective for ARRA was to save and create jobs almost immediately. Secondary objectives were to provide temporary relief programs for those most impacted by the recession and invest in infrastructure, education, health, and ‘green’ energy.

Discussion Questions and Answer: 

1. How does Google's business model use personal data?

Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ]

Source: http://www.weegy.com/?ConversationId=DEE133EE

2. What do you think are the major privacy concerns raised by Google's business model and applications?

-The major privacy raised by Google’s business model and application is that there company is open for all the people who browse in it.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

- For me NO , because google we all know that it has many information around us and reveal it in the public that browse in it,







Monday 16 April 2012

Case Study : Chapter 2


Questions to Consider

1. What message is sent to IT workers by the actions of New York Law School and Colleges even if unrelated job-performance issues justified their actions in firing Gross and Perry?


For Dorothea Perry and Robert Gross, the course of action seemed clear enough when Gross, an IT support specialist working at New York Law School, opened a folder on a faulty PC last June only to discover thumbnail images of naked young girls in sexually explicit positions. 

2. since the incident, a number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. most of the laws state that worker who reports such a discovery is immune from any criminal,civil or administrative liability. failure to report the discovery can result to a fine, imprisonment or both,do you think such laws will encourage reporting? why or why not?



For me YES, So that the people will know the true issue of whats happening in there society and for them also to be warn what to do or not to do.

Discussion Questions

1. How to distinguish between a gift and a bribe? provide an example of a "gift" that falls in the gray area between a gift and a bribe.



There’s often a fine line between a gift and a bribe. The questions that we’ve just asked, however, may help in drawing it, because they raise key issues in determining how a gesture should be interpreted: the cost of the item, the timing of the gift, the type of gift, and the connection between the giver and the receiver. If you’re on the receiving end, it’s a good idea to refuse any item that’s overly generous or given for the purpose of influencing a decision. But because accepting even small gifts may violate company rules, the best advice is to check on company policy.

2. Discuss the following topic: law do not provide a complete guide to ethical behavior. an activity can be legal or not ethical.

For me the activity that is Legal is with complete papers to do the work and to open the company for the people and not against the law. It is not ethical when it is illegal and working without any permission to established the company.

3. What is a professional malpractice? Can an IT worker ever be sued for professional malpractice? why or why not?

For me Yes , because if an IT worker malpractice his job or project it is also a failure of the company , because the company also relay on the worker and their works.

4. review the PMI member code of ethics in appendix E. for each point in the code, provide an example of a project manager action that would break the code.

In the pursuit of the project management profession, it is vital that PMI members conduct their work in an ethical manner in order to earn and maintain the confidence of team members, colleagues, employees, employers,  customers/clients, the public, and the global community.

5. what must IT professionals do to ensure that the project they lead meet the clients expectations and do not lead the charges of fraud, fraudulent misrepresentation, or breach of contact.

As an IT student IT professional should ensure that the project order to him should work perfectly and function well and the details should be perfect base on what the client want to the project

6.should all IT professionals be either be licensed or certified? why or why not?

For me IT professional should be licensed and certified. Because  If  you have the both many companies will hire you and will trust you on the field of IT . Also even thou you are not a licensed IT but your good in programming your also be hire but for me your should have both to ensure your future .

7. what commonalities you find among  the IT professionals codes of ethics discussed in this chapter ? what differences are there? do you think there are any important issues not addressed by these codes of ethics.




















Case Study : Chapter 1


Questions to Consider

1. Which issue is more disconcerting- the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? defend your position.

In my opinion the most disconcerting is the fact that a board member leaked confidential information about the firm
. Because even thou they are a board member they still leaked an information that is against the rules of the Company.

2. Can the use of pretexting to gain information ever be justified? is it consider legal under any circumstances.

For me Pretexting is illegal. Because you are doing things that are not assigned to you to gain information in a particular company that you are working in.


Discussion Questions

1. There are many ethical issues about which people hold very strong opinions-abortions, gun control and the death penalty, to name a few. if you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues, would it affect your ability to work with this person? why or why not?

Base on my opinion as part of a team member project it will not affect my abilities to work with them. Because as a team we should help each other and share ideas about the issues .

2. What do you think are the most important factors that helped you define your own personal code of ethics?

For me the most important factors that will helped me define my own personal code of ethics is being open minded and listed to the advices and experience of the people .

3. Do you think that ethics in business is improving or getting worse ? defend your position.

As the generation goes by, I think the ethics in business is improving because of the new technologies that is presented to us the help us a lot in terms of business and make our work fast.

4. The ethics resource center identified five characteristics of a successful ethics program suggest a sixth characteristic, and  defend your choice.

I would suggest the characteristic of being “Respectful”. Because without Respect to each other there will be no unity in the work .

5. Which incident has a higher negative impact on an organization-an unethical act performed by an hourly worker or the same act performed by a senior manager of the organization? explain your answer fully. should the hourly worker be treated differently than the senior manager who committed the unethical act? why or why not?

In my opinion they both have the higher impact on an organization. Because they both work in their field and
  they should be treated fairly because the both work in the same company that every worker should be treated equally.



6. It is a common and acceptable practice for managers to hold people accountable to meet "stretch" goals, quotas, and budgets. How can this be done in a way that does not encourage unethical behavior on the part of employees.

  
For me it is important, because in this way the salary per hour will be computed based on the hours they worked. As observed now a day the company gives Orientation to the workers for able to them to understand more how the company hold them accountable meet.

7. Is every action that is legal also ethical? can you describe an action that is legal but ethically wrong? is every ethical action also legal? is the law, not ethics, the only guide that business managers need to consider? explain.
 
For me It depends on how the employee done the work given to him. Example of this is when an employee given a task to make a research paper and it’s been approved by the manager and you also give it to other companies for you also to benefit extra money in that way its ethically wrong.
 
8. do you think it is easier to establish an ethical work environment in a nonprofit organization? why or why not?
   
In my opinion and based on my observation now a day it is hard to establish a organization that is nonprofit, because now a day people need money in order for them to sustain their needs .
 
9. This chapter discusses the four approaches to dealing with moral issues. identify and briefly summarize each one. do you believe one perspective is better than others? if so, which one and why?
Beneficence -To do what is in the patient’s best interests
Nonmaleficence Not to cause harm and, indeed, to seek to prevent it
Autonomy (‘self-rule’) To respect the right of the individual to make choices about his or her own life in the context of equal respect for everyone else involved
Justice -To treat all patients fairly and without unfair discrimination

For me the better perspective than other is Justice because as said on the definition all should be treated fairly and without unfair discrimination.


Discussion Questions

1. CA executives involved the accounting scandal were not accused of reporting bogus contracts or hiding major problems in business. The contracts that were backdated were real sales agreements. Was this really a crime? Should the individuals have been punished so harshly?

In my opinion it is a crime, because the employee or the individuals hide the major problem in the company and the contracts that was backdated was also hidden by the people behind the scandal.

2. In December 2004, CA appointed Patrick J. Gnazzo as a senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically, Gnazzo served in this role at United Technologies for 10 years and had been a member of the board directors of the ethics Offices Association .Gnazzo reported to a  new executive vice president and a general counsel at CA as well as the board's Compliance committee. Outline some of the Actions Gnazzo might have been taken in his first six months on the job


3. John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and President his first few months with the firm were rough- major customers threatened to dumb the firm some products were behind schedule and were of poor quality; executives had to be fired for breaking company  rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. what sort leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?


4.
 CA has been hit with numerous scandals since the late 1990's. these scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on this distractions. compare the revenue growth and stock price of CA to that of some of its competitors over the period 2004-2008 (be sure to use CA's corrected figures!) can you detect any impact of these scandals on CA's performance? what else might explain the difference in performance?

Discussion Question

1. Identify at least two other companies that mange their suppliers in a manner similar to Dell computers. Do these companies have anything in common with Dell?


2. Can you identify any disadvantages for dell in taking the approach to managing suppliers?


3. Do you think that this approach to managing suppliers is unethical, or is it acceptable and ethical? Explain your reasoning.


4. Would you recommend any changes to the way Dell manages suppliers? Defend your position.


Discussion Question

1. Discuss how a CIO might handle Schrage's Scenarios using the suggested process for ethical decision making presented in this chapter.

In my opinion the CIO should orient the process of formal and ethical process , because if it is not oriented they will have different thought about the company

2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage's scenarios.
Base on my understanding short term losses that are business losses some of their amount of quantity and long term losses is they have the current need to put up a project or business.


3. Must businesses choose between good ethics and financial benefits? explain your answer using Schrage's scenarios as example. 

Base on what I have understand if the company choose the financial benefits but in a wrong process of making financial benefits the ethics is not apply because it is illegally wrong , but if the business choose good ethics and with the correct process that’s the way that company will be successful.

Friday 13 April 2012

What take's to be an IT Professional?


For me to be an IT Professional Attitude is definitely everything people do not seem to see that their opinion
of the world is also a confession of character next is Concentration and Knowledge of your degree.Being an IT Professional needs a lot of concentration and a whole lot of knowledge, next is effort and passion. Putting effort into everything is almost useless without the passion to do it. It also takes self esteem as an asset because IT Professionals are usually faced with a lot of people everyday in their lives.For the remaining task to be a professional in IT, it is developing your character as a professional that is very important as no one can be called a professional if he or she did not master their vocation.All of these things are possible if we have faith in God,faith in what we can do and faith in what our future will be.