Wednesday 9 May 2012


Chapter 10Problem with suppliers

Questions to Consider

1. How can an organization ensure that all the members of its supply chain will behave ethically?
- For the Organization to ensure that all the member of the supply chain will behave ethically in the way that the member pay properly and not taking advantage that they are a member of your Organization.
2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
- They should always have a good deal with the product and properly discussed the rules clearly.

Manufacturers Compete on Green Computing

Questions to Consider

1. How have green computing efforts lowered the total cost of computer ownership?
As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. [ Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels. As an example, each node of Supermicro's SuperBlade® can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade® can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees.
Source: http://www.weegy.com/?ConversationId=8D859AA5

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
-For me both are have benefits on building greener computers it helps more in our environment to prevent pollutions and in implementing programs it also give benefits to the people so that they will now how to use the computer properly and not to abuse using the computer.

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 
-As I see it’s the APPLE is in top rating.

Chapter 9:  Twitter Emerges as News Source  for Iran protesters

Questions to Consider

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?.
-There seems to be a backlash about the important place social media has in our lives. People such as Malcolm Gladwell have written extensively that the value of Facebook and Twitter is overblown when it comes to creating social change.
Much of Gladwell’s reasoning is flawed, but his pessimism does force us to be clearer about our goal with social media. For those of us looking to make a difference though activism campaigns, Gladwell is right that the challenge is to build and mobilize online communities rather than simply make noise. During a Social Media Week event, The Yes Men co-founder Andy Bichlbaum compared social media tools to the phone trees that spurred people to action in the 1960s. The telephone has played a big role in information sharing over the years, but we don’t hold the telephone accountable for the lack of social activism the way Gladwell and others blame Facebook for societal apathy. In real life it can be our nature to be passive, and it should come as no surprise that we can be the same way on Facebook. That is, it’s easy to “like” a cause on Facebook, but it is a much bigger lift to donate money, show up at a rally and vote on Election Day. As Naomi Hirabayshi of DoSomething.org put it, real change in social entrepreneurship takes place offline, but word of mouth (and its online equivalent, which is social networking) is the best way to share trusted information.

2. How trustworthy is the information one gleans from social networks such as Twitter?
Walther and Parks (2002), responding to theoretical developments in CMC, proposed that a primary goal of interpersonal relationships is to add connectedness (or “warrant”) to relationships. They believed that the highest-value warranting information was that perceived to be most free from manipulation, i.e. provided by other people. More recently, Walther, Heide, Hamel, and Shulman (2009) applied the warranting hypothesis to Facebook, a type of social network site (boyd, 2007). In support of their primary hypothesis, they found that individuals warranting another person’s profile were more likely to evaluate that person’s attractiveness and extroversion based on comments left by others than by information that person provided. The study stipulated that a warranting effect would be present in the initial stages of a relationship that starts online and moves offline.

Social Networking Disasters for Dominos

Questions to Consider

1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?.

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

-For me the most effective way is through online , because as you observe now a day people are more in the internet and its fast in the internet.

3. Identify three lessons that other companies could learn from Domino’s experience.
- Once they became aware (more on how long this took later), the company worked to get the videos removed from the original hosting provider (doesn’t matter, as they have since been uploaded to other sites). Dominos then responded with email communications from Tim McIntyre, Vice President of Communications. He indicated how repulsed he was, and described that their security team was going to look into the matter to identify which store and responsible individuals. The company is in damage control mode, operating reactionary during a crisis. While they are taking some of the steps you would expect a brand to do under the circumstances (like terminating the employees and filing criminal complaints with local authorities), they are still missing the opportunity to repair some of the damage done with their customers.

Chapter 8Western Cape Striving to Eliminate the Digital Divide

Question to Consider

1. How important is access to ICT in children’s education?
ICT is important in primary schools because it can help kids to achieve better results in other subjects and to find what they need and use information in particular ways. It is important that children become familiar with ICT at an early age, because they will need those skills for the remainder of their education and in adult life.

Source : http://www.ehow.com/about_6612110_importance-ict-primary-education.html

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
ICT is a global phenomenon, and children who are computer literate at an early stage of their lives might deal better with the modern world. A sound knowledge of ICT makes it much easier for children to find and organize information. An Office for Standards in Education (Ofsted) funded study (2009) that took place between 2005 and 2008 identified good practices in the teaching of ICT. Although the ICT curriculum was sometimes poorly balanced, its use contributed to children doing better in some subject areas. The study also found that the primary school children spent as much time on computers as the curriculum allowed.
Technological Advances Create Digital Divide in Health Care
Questions to Consider
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?.
-  One key opportunity is to integrate clinical service delivery with community prevention in order to reduce demand for resources and services; improve health, safety, [ and equity outcomes; and provide medical providers with skills and strategies to change the social circumstances that shape the health of their patients. Prevention Institute outlines an approach that community health centers can take to promote community health even as they deliver high quality medical services to individuals.

2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

-For me I think that they should also provide to the poor people, so that they can also benefits on the telemedicine .

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions? 
- Telemedicine is a vast subject, but as yet there are limited data on the clinical effectiveness and cost-effectiveness of most telemedicine applications. As a result, objective information about the benefits and drawbacks of telemedicine is limited. This review is therefore based mainly on preliminary results, opinions and predictions. Many potential benefits of telemedicine can be envisaged, including: improved access to information; provision of care not previously deliverable; improved access to services and increasing care delivery; improved professional education; quality control of screening programmes; and reduced health-care costs. Although telemedicine clearly has a wide range of potential benefits, it also has some disadvantages. The main ones that can be envisaged are: a breakdown in the relationship between health professional and patient; a breakdown in the relationship between health professionals; issues concerning the quality of health information; and organizational and bureaucratic difficulties. On balance, the benefits of telemedicine are substantial, assuming that more research will reduce or eliminate the obvious drawbacks.

Chapter 7: Boeing Dream liner Faces a few bumps in the road

Questions to Consider

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
- Yes, because some of the product have some defect that are not fully check by the owner of the software.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?.
-In order to reduce negative consequence of the software, they should put copyright on the product and insure that the product is in high quality and no defects when it is deliver in the customers.

Patriot Missiles Failure

Questions to Consider

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
- The steps that the developer of the Missiles should do is to check and secure that the software that will be use is correct or try testing some of the samples to make it correct.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
-As I read the issue about this they deploy the Patriot Missiles in the Israel and Saudi Arabia. Because it’s a desert and open field that they can test the missiles in that area.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?.
-The lesson that should be applied to develop the business information system software is to secure its parts and to insure it function well.

Chapter 6: RIAA fights Music Piracy

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

- I think it helps the music industry , because I help to prevent not to buy the piracy music instead of buying the original copy.

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
-I think it will not affect the ISP because it only detect the site those who are pirating.

Lotus Vs. Borland

Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

-For me the different in Excel from Borland is that, all the problems, procedures and formula needed to compute for large quantity of amount can be very easy, because it provides complete instruction for every formula and it is in its quality. I like Excel most especially that I can be able to run an Visual Basic application in Macro. But the only reason why the Borland Excel was being successful, because they just infringing the structure, commands, codes and all those stuffs according to survey, that's the reason they can gather some ideas on how to build same application more quality than the other.

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

-In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

-If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an investigation in court you are assuredly obliged to face the court as a manager in your company and aside to face the court you will be put in prison

Chapter 5 :  Sexting

Questions to Consider

1. Does sexting represent a form of expression that is protected by the First Amendment?

-  For me Sexting is not a form of expression, because it is just a text and you can’t see or feel the expression of the one you are texting.

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 
-For people will able to be protected from the danger of sexting is to avoid from texting to those people that are in this action.

The Electronic Frontier Foundation (EFF)

Questions to Consider

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why?
From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.
Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 140,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public.
EFF is a donor-funded nonprofit and depends on your support to continue successfully defending your digital rights. Litigation is particularly expensive; because two-thirds of our budget comes from individual donors, every contribution is critical to helping EFF fight—and win—more cases.

2. What reasons might a firm give for joining and supporting EFF?
-It will protect your Digital Innovators

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say? 
- If this will improve the telecommunication of  our country , I will support the program so that our communication will be faster and easier.







Wednesday 2 May 2012



Case Study: Chapter 3

Trading Scandal at Society General

Questions to Consider:

1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

- In trading you should know the person or company that you are trading and know their backgrounds for you able to know if they are safe or not. Trading also Is a way of Dealing a person thing and know if it is in good condition to be trade.

2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Significant deficiencies in internal controls, unauthorized trading activities, computer hacking and the breach of trust involving a conscious effort by the rogue trader to deceive his managers were noticed. Jérôme Kerviel is accused of creating a huge loses by a single unauthorized trader in financial history. In the course of 2007 he made unauthorized trade worth € 30 bn. on European stock market futures, winning € 1.4 bn. by the end of the year. Having disguised the importance of his exposure, and earnings, with fictitious trades, he went on in January 2008 to make even bigger trades. The bank stated that he deliberately set out to lose money in 2008 to bring down the suspicious size of his 2007 earnings.

Source http://www.hg.org/article.asp?id=6028

Whistle-Blower Divides IT Security Community

Discussion Questions and Answers:


1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

-For me Mike Lynn did not act responsible , because he lie on the people and just protect himself for him not to be fired from his work.

2. Do you think that Cisco and ISS were right to pul the plug on Lynn's presentation at the Black Hat conference? Why or why not?

-Yes, So that people will know the truth about the conference and what’s going on in that conference so that people will also have idea and opinion about it.

3. Outline a more reasonable approach toward communicating the flaw in the CIsco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.

In monitoring in regardless of the way ML was treated, I certainly hope you would have taken this corrective action. The threat is much greater now, if you don't take any new action to strengthen your systems (something you haven't done in the past), his new information MUST increase the overall risk.

Source: http://taosecurity.blogspot.com/2005/07/new-cisco-advisory-and-statements-i.html

Case Study: Chapter 4

Discussion Questions and Answer:


1. What type of security breaches of medical records are common today?

-For me Digital technology, which encompasses electronic mail, facsimile, and the Internet, is increasingly becoming the preferred means of maintaining and sharing medical records.

2. What measures are being taken by the government and private industry to safeguard EHRs?

-The measures are being taken by the government and private industry to safeguard EHR’s is to implement the health Insurance portability and accountability Act (HIPAA), commonly called the administrative simplification provisions, mandates the creation of standards to protect the confidentiality of electronic transactions within the healthcare system. The HIPAA Security Rule safeguards the confidentiality of electronic patient information. In implementing the Security Rule, the U.S. Department of Health and Human Services (HHS) regulated enforcement tasks to the Centers for Medical and Medicaid Services (CMS). CMS has the authority to interpret the provisions, conduct compliance review, and impose monetary penalties on organizations that do not comply with HIPAA security regulations. It recommends system features and practices that will help secure sensitive information in EHR’s and also begun auditing all the hospital to determine whether CMS reliance on complaints was sufficient to promote compliance with the HIPAA privacy provisions. This higher degree of control is thin the context of the electronic health record (EHR).


3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

-Base on that I have research , the ARRA have a good objectives in the community and the primary objective for ARRA was to save and create jobs almost immediately. Secondary objectives were to provide temporary relief programs for those most impacted by the recession and invest in infrastructure, education, health, and ‘green’ energy.

Discussion Questions and Answer: 

1. How does Google's business model use personal data?

Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ]

Source: http://www.weegy.com/?ConversationId=DEE133EE

2. What do you think are the major privacy concerns raised by Google's business model and applications?

-The major privacy raised by Google’s business model and application is that there company is open for all the people who browse in it.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

- For me NO , because google we all know that it has many information around us and reveal it in the public that browse in it,