Tuesday, May 15, 2012

Chapter 10


Questions to consider:


1. How can an organization ensure that all the members of its supply chain will behave ethically?


ANSWER : They should always keep an eye on all the members of its supply chain. They must be strict. Remove all members who behaved unethically.


2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?


ANSWER : Commitment, trust and continuous improvement. Marketing attempts to create an impression of a personal relationship to customers even if the supplier does not know the customers or even meet them.


COURTESY OF : http://www.huizenga.nova.edu

 Discussion questions:


1. How have green computing efforts lowered the total cost of computer ownership?


ANSWER : The goals of green computing are similar to green chemistry; reduce the use of hazardous materials, maximize energy efficiency during the product's lifetime, and promote the recyclable or biodegradability of defunct products and factory waste. Research continues into key areas such as making the use of computers as energy-efficient as possible, and designing algorithms and systems for efficiency-related computer technologies.


LINK : http://www.weegy.com/?ConversationId=0B0F4D19

2. Which approach can yield greater benefits-building greener computers or implementing programs that change users’ behavior so they operate their computers in a more responsible manner?  Explain your response.


ANSWER : In today’s’ climate, it is difficult to ignore the ongoing concerns about climate change and the environment and whereas there appear to be no easy solutions for businesses, the IT community can have a significant impact on the worldwide carbon footprint 
by adopting a ‘greener’ approach to computing .Green computing is rising energy costs and potential savings. Energy to manufacture, store, operate, and cool computing systems has grown significantly  in the recent years, primarily due to the volume of systems and computing that companies now heavily rely upon.


LINK : http://ijarcsse.com/docs/papers/february2012/volume_2_issue_2/V2I2073.pdf


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.


ANSWER :


Hewlett Packard(HP)In recent years, Hewlett Packard has introduced many Energy Star qualified computers onto the market, including several that have won high EPEAT ratings.


Dell - has introduced an ultra-green desktop computer called the Studio Hybrid.


AppleApple is has begun to make many of its green computers with recyclable materials such as aluminum, polycarbonate and glass. 


Lenovo - uses post-consumer recycled materials such as plastic water bottles in the manufacture of its green computers.


I found this information on http://www.brighthub.com/environment/green-computing/articles/61813.aspx because i cannot find it in http://www.epeat.net/
Chapter 9


Questions to consider:


1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?


ANSWER : Twitter enables users to send or read text-based posts. Twitter can be helpful or it could  be harmful, it depends on how you will use it.The best way to add real value is to keep your eyes open and improve as many things as possible. Figure out how you can help the situation or connect with people who can. You have to know what you are involved in, inside and out, so you’re ready when an opportunity presents itself. 


COURTESY OF: http://www.wikipedia.org/ and http://talentegg.ca/


2. How trustworthy is the information one gleans from social networks such as Twitter?


ANSWER : There has been some interesting debate on the credibility of twitter as perceived in the eyes of users. According to a recent study by the Association for Education in Journalism, entitled: A little bird told me, so I didn't believe it: Twitter, credibility, and issue perceptions, twitter isn’t doing well in the trustworthy stakes when it comes to news.


In the survey they established that twitter was the one source of news that people were the least likely to trust. Even when the actual tweets came from a reliable news service! This is fascinating stuff. I mean, you can see why people could have problems believing in what twitter has to say, can’t you?




LINK : http://www.techinstyle.tv/2010069492/uncategorized/is-twitter-trustworthy/ 


 Discussions question


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?


ANSWER : Then they should gather facts and figures before the damage. In other words, they should anticipate the attack on its brand, in that way they could reduce or maybe avoid future damages.


2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?


ANSWER : Online media has a very big role in  influencing people than printed press. Online media could post  images, videos or even a message in an instant which print press couldn't. by the use of these, people could see factual or unreal information that would spread worldwide.


3. Identify three lessons that other companies could learn from Domino’s experience.

ANSWER : 
Chapter 8


Questions to consider : 




1. How important is access to ICT in children’s education?


ANSWER : Information and Communication Technology in children's education would enable children to explore and search information easily. This would help them widen their knowledge as long as they know computer ethics. 


2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?


ANSWER : Money i guess is one of the fact that hinders anyone who wants to access Information and communication technology(ICT). Poor countries like Philippines do not have a budget, or maybe they have but they lack on financial support with regards to accessing ICT especially in rural areas. 


Discussion questions


1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

ANSWER : As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness.


LINK : http://www.weegy.com/?ConversationId=9771CF9C


 2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?


ANSWER : Yes, Healthcare organizations should, but not just for those wealthy people but for everyone. Telemedicine helps eliminate distance barriers and can improve access to medical services. Everyone needs medical services don't they? 


COURTESY OF: http://www.wikipedia.org/


3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

ANSWER :  telemedicine clearly has a wide range of potential benefits, it also has some disadvantages. The main ones that can be envisaged are: a breakdown in the relationship between health professional and patient; a breakdown in the relationship between health professionals; issues concerning the quality of health information; and organizational and bureaucratic difficulties. On balance, the benefits of telemedicine are substantial, assuming that more research will reduce or eliminate the obvious drawbacks.


LINK : http://www.ncbi.nlm.nih.gov/pubmed/15829049

Chapter 7


Questions to Consider:


1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

ANSWER :  I think it is normal to buy software with defects though that would give a bad impression into the consumers.


2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?


ANSWER :  Software engineers should refine techniques to mediate risks of developing software products that should of course meet the needs of their clients.


Discussion questions


1.   With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life?  Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Sued?  Why or why not?


ANSWER : They should have Double checked everything.




2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?


ANSWER : Their intention to end the war i think is ethical.


3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?


ANSWER : Software development is a very critical job. You could be sued for just for making a single error. That is why you should double check everything, for there is no room for any mistake.

Monday, May 14, 2012


Chapter 6


Questions to consider


1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?


ANSWER : I think RIAA's stand on copyright infringement helps the music industry, for RIAA only protects the value of creative work. When you make unauthorized copies of someone’s creative work, you are taking something of value from the owner without his or her permission and that i think is punishable. 


2.  Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?




ANSWER : During a panel discussion held for US publishers this week, RIAA chairman Cary Sherman said his association and a number of ISPs—including AT&T, Cablevision, Comcast, Time Warner Cable, and Verizon—will begin policing traffic to crack down on piracy starting this summer.


The deal is not new—the RIAA and the participating ISPs came to this agreement last June. But it has taken time to implement. According to CNET, Sherman explained that "each ISP has to develop their infrastructure for automating the system." He gave July 12 as the "start date" for the traffic monitoring to start.


The system involves major labels monitoring BitTorrent and other peer-to-peer networks for copyright infringement, and then reporting that infringement to ISPs, who will monitor their networks for the transgressors.


Then, the ISPs will send goon squads out to capture transgressors and bring them back to the compound for “re-education.”


LINK : http://arstechnica.com/tech-policy/2012/03/riaa-and-isps-to-police-your-traffic-starting-july-12/


Lotus vs Borland


Discussion questions


1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs.  Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

ANSWER :  Graphs in a spreadsheet program such as Lotus 1-2-3 and Quattro Pro are similar to what we call graphs in math class. In Microsoft Excel they called charts.
Graphs then, are visual representations of worksheet data. Graphs often makes it easier to understand the data in a worksheet because users can easily pick out patterns and trends illustrated in the graph that are otherwise difficult to see.




2. The courts took several years to reverse their initial decision and rule in favor of Borland.  What impact did this delay have on the software industry?  How might things have been different if Borland had received an initial favorable ruling?




ANSWER : The U.S. Court of Appeals for the First Circuit released its long-awaited decision in Lotus Dev. Corp. v. Borland Int'l, Inc., No. 93-2214 (1st Cir. Mar. 9, 1995), reversing a series of district court decisions that had found Borland liable for copyright infringement.


On appeal, Borland does not dispute that it factually copied the words and arrangement of the Lotus menu command hierarchy. Rather, Borland argues that it “lawfully copied the unprotectable menus of Lotus 1-2-3.” Borland contends that the Lotus menu command hierarchy is not copyrightable because it is a system, method of operation, process, or procedure foreclosed from protection by 17 U.S.C. Section 102(b). Borland also raises a number of affirmative defenses.


3. Assume that you are the manager of Borland’s software development.  With the benefit of hindsight, what different decisions would you have made about Quattro?




ANSWER: I think the best thing to do is to resign. 

Chapter 5


Questions to consider


1. Does sexting represent a form of expression that is protected by the First Amendment?

ANSWER :  'Sexting' and other teen autopornography are becoming a widespread phenomenon, with perhaps 20% of teenagers admitting to producing nude or semi-nude pictures of themselves and an ever greater proportion, perhaps as many as 50%, having illegally received such pictures from friends and classmates. It is, moreover, beginning to result in criminal prosecutions, and the statutory penalties are severe. Given the reality of changing social practices, mores and technology utilization, today’s pornography laws are a trap for unwary teens and operate, in effect, to criminalize a large fraction of America’s young people. As such, these laws and prosecutions represent a stark example of the contradictions that can occur when governmental policies and initiatives built on past truths and values collide with new and unanticipated social phenomena. 

The focus of anti-pornography enforcement in recent years has been the child pornography laws. The landmark cases of New York v. Ferber and Osborne v. Ohio have established and defined a categorical exclusion that denies First Amendment protection to sexually explicit visual depictions of minors. Even though Ferber and Osborne may not strictly speaking require a conclusion that sexting and other autopornography are unprotected speech, at least some lower courts and prosecutors appear to regard them that way. 



2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 

ANSWER : While this behavior is perfectly legal and accepted among consenting adults, teenagers who similarly experiment with this communicative outlet are often dragged into the judicial system by police officers, prosecutors, and judges. They reflexively categorize the activity as a child pornography offense and proceed to utilize the strict laws designed to  protect children as devastating weapons  against them. Often, juveniles prosecuted for this behavior end up being included on the 
public sex offender registry alongside the worst child molesters and pedophiles.


Discussion questions

1. Visit the EEF Web site at www.eff.org and develop a list of its current “hot” issues.  Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why.
ANSWER : From the Internet to the iPod, technologies are transforming our society and empowering us as speakers, citizens, creators, and consumers. When our freedoms in the networked world come under attack, the Electronic Frontier Foundation (EFF) is the first line of defense. EFF broke new ground when it was founded in 1990—well before the Internet was on most people's radar—and continues to confront cutting-edge issues defending free speech, privacy, innovation, and consumer rights today. From the beginning, EFF has championed the public interest in every critical battle affecting digital rights.

Blending the expertise of lawyers, policy analysts, activists, and technologists, EFF achieves significant victories on behalf of consumers and the general public. EFF fights for freedom primarily in the courts, bringing and defending lawsuits even when that means taking on the US government or large corporations. By mobilizing more than 140,000 concerned citizens through our Action Center, EFF beats back bad legislation. In addition to advising policymakers, EFF educates the press and public.



2. What reasons might a firm give for joining and supporting EFF?


ANSWER :  It's my firm belief that there is no greater catalyst for the success of a society than liberty. History tells that story again and again around the world. As new aspects of society -- and whole new societies -- are built online, the EFF's mission is to protect that liberty. The payoff, if it succeeds, is tremendous, a huge increase in economic prosperity and an incalculable dividend of personal freedom


3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor.  The CFO has asked if you, the CIO, support this action.  What would you say?

ANSWER : The EFF's primary cost is the staff, who because they work much harder than their salaries would warrant, are themselves all donors. This staff works to get the message out and organize the fight for digital liberty, and our on-staff attorneys make the difference in court and legislative battles on all fronts.

Chapter 4


Discussion Questions

1. What type of security breaches of medical record are commonly today?

ANSWER :  As i search to find breaches in medical records i found this information: Agency officials originally thought the hackers stole 24,000 Medicaid claims. But officials now say 24,000 files were stolen, and each file potentially contains information on hundreds of people.
Officials say the attack started last week and likely came from eastern Europe. The information was on a new server that had security tools installed improperly.
The agency says it plans to reach out to those affected and offer free credit monitoring services for one year.

LINK :   http://news.yahoo.com/utah-medical-records-breach-more-extensive-201409704.html 

2. What measures are being taken by the government and private industry to safeguard EHR's?


ANSWER :  I found the top 5 best practices on how to safeguard EHR's, as stated on an article i found : 

1. An organization-wide commitment to strong security
A complete Information Security Program (ISP) cuts across the entire enterprise, not just the IT department. It also includes items such as facilities availability and contingency, disaster preparedness, employee safety and human resource confidentiality.

2. A view of IT security as a competitive advantage
Savvy companies understand that in ever increasing amounts, the heart of an enterprise is found in the proper collection, storage, communication, availability, integrity and protection of electronic data. Security best practices leaders view protecting that information as a competitive advantage. In contrast, companies that experience IT security breakdowns are subject to damaging consequences that can limit competitiveness.

3. A sharp focus on security policies and processes
Having the latest and greatest array of technical "gear" such as firewalls, wireless infrastructure, virtualization and vulnerability management software appears to lead to a false sense of security in many cases. The best gear can be compromised without well-documented security policies and procedures that are rigorously followed and periodically updated, and the discipline to monitor and measure compliance to industry best practices such as ISO 27002.

4. Include business associates and partners in EHR security programs
As the exchange of electronic health information becomes more pervasive, the Department of Health and Human Services has made it clear that all entities in the chain bear responsibility for safeguarding electronic data. A breakdown anywhere in the chain affects all entities, both practically and legally speaking, and even a business associate's breach of electronics health records may require the notification of the customers/patients of all entities with access to the data. Successful organizations collaborate with business associates on the implementation of security programs and revise contracts to include data security/compliance requirements, breach notification costs, independent security assessments and other related issues.

5. Regularly conduct independent security assessments
The IT security environment is becoming ever more complex; safeguarding it is a dynamic endeavor that requires constant vigilance. HIPAA law requires covered entities to conduct routine evaluations of the effectiveness of records security programs, policies and procedures. An independent security assessment can evaluate security against potential risks in a format compliant with HIPAA Security Standards, even including business associates and partners with whom health data is exchanged. 

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?


ANSWER : As stated, ARRA requires healthcare institutions to notify individuals affected. ARRA is said to increase the enforcement of HIPAA(regulates the availability and breadth of group health plans and certain individual health insurance policies. It amended the Employee Retirement Income Security Act, the Public Health Service Act, and the Internal Revenue Code.) which means ARRA requires informations that may be breached.

Discussion Questions



1. How does Google's business model use personal data?


ANSWER :  Data or cookies is stored by  google or by any website within a browser and then subsequently sent back to the same website by the browser.this is to remember things that a browser had done there in the past, which can include having clicked particular buttons, logging in, or having read pages on that site months or years ago.

2. What do you think are the major privacy concerns raised by Google's business model and applications?


ANSWER :  Information breaches, though Google recently caused a stir when it decided to consolidate its privacy policies and share users' personal data across multiple Google services, including Gmail, Google search and YouTube. but despite the controversy google remains one of the world's favorite search engine. 

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

ANSWER : It is true that google provides protection to informations. One of these is, they provide privacy settings for the user that he/she may regulate cookies or data stored within his/her PC. But is this enough?google stores several personal information everyday. and they have now massive amounts of data which we all know may breach maybe due to hackers or human error.