Monday 14 May 2012

Case Study : Chapter 10


Questions to consider


1.How can an organization ensure that all the members of its supply chain will behave ethically?
-Three ideas to ensure that all the members of its supply chain will behave ethically:
    1. Create guidelines for your suppliers
    2. Look out for suppliers' credentials
    3. Waste


reference: http://www.smarta.com/advice/suppliers-and-trade/business-suppliers/three-ideas-make-your-supply-chain-more-ethical

2.What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
-Organizations should behave so that their suppliers will also behave.

 Discussion questions


1.How have green computing efforts lowered the total cost of computer ownership?
-Climate Savers Computing Initiative (CSCI) is an effort to reduce the electric power consumption of PCs in active and inactive states. The CSCI provides a catalog of green products from its member organizations, and information for reducing PC power consumption.


reference: http://en.wikipedia.org/wiki/Green_computing

2.Which approach can yield greater benefits-building greener computers or implementing programs that change users’ behavior so they operate their computers in a more responsible manner?  Explain your response.
-Here are some approach to yield greater benefits-building greener computers or implementing programs that change users’ behavior so they operate their computers in a more responsible manner:
*Save on initial hardware purchase cost: An entire SoftXpand system costs a fraction of a single stand-alone PC.
*Cut down software licenses costs: install all your software on a single PC and make them available to multiple users.
*Dramatically decrease maintenance overhead: Maintaining assets require a considerable investment in time and money.
*Increase operational efficiency: You need to install and configure only one machine. When you want to upgrade, you don’t need to buy mutiple new PCs.


reference: http://www.miniframe.com/products/total-cost-of-ownership-tco.html

3.Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.
-EPEAT is a comprehensive environmental rating that helps identify greener computers and other electronic equipment. 

Case Study : Chapter 9


Questions to consider


1.Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
-When Jack Dorsey, Evan Williams and Biz Stone founded Twitter in 2006, they were probably worried about things like making money and protecting people's privacy and drunk college kids breaking up with one another in 140 characters or less. What they weren't worried about was being suppressed by the Iranian government. But in the networked, surreally flattened world of social media, those things aren't as far apart as they used to be — and what began as a toy for online flirtation is suddenly being put to much more serious uses. After the election in Iran, cries of protest from supporters of opposition candidate Mir-Hossein Mousavi arose in all possible media, but the loudest cries were heard in a medium that didn't even exist the last time Iran had an election.

reference: http://www.time.com/time/world/article/0,8599,1905125,00.html

2.How trustworthy is the information one gleans from social networks such as Twitter?
- In a survey of Twitter users, support for the warranting paradigm with trustworthiness was not found on
the site. However, individuals still followed those they found trustworthy, lending support to the idea
that the warranting principle is confined to specific conditions. More generally, site-external and
site-external resources were more frequently used for evaluating self-provided than other-
provided information. Implications are discussed for future new media and CMC research.


reference: http://usc.academia.edu/aschrock/Papers/198931/Are_You_What_You_Tweet_Warranting_Trustworthiness_on_Twitter

 Discussions question


1.Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
-

2.Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
-

3.Identify three lessons that other companies could learn from Domino’s experience.
-

Case Study : Chapter 8


Questions to consider


1.     How important is access to ICT in children’s education?
-Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners.


reference :http://www.ehow.com/about_6612110_importance-ict-primary-education.html#ixzz1uSjrMKCR

2.     What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
-A sound knowledge of ICT makes it much easier for children to find and organize information.


reference: http://www.ehow.com/about_6612110_importance-ict-primary-education.html#ixzz1uSjrMKCR


Discussion questions

1.) Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
-One of the important political goal in the coming years in Vietnam is the achievement of universal coverage of health insurance. For that purpose the government is pursuing the strategy to provide free health insurance cards to all the poor, the ethnic minority populations and the persons living in remote or mountainous areas.


reference: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1461327

 2.) Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?
-No, they should also provide services that the poor people can afford.

3.) What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?
-Telemedicine is a vast subject, but as yet there are limited data on the clinical effectiveness and cost-effectiveness of most telemedicine applications. As a result, objective information about the benefits and drawbacks of telemedicine is limited. This review is therefore based mainly on preliminary results, opinions and predictions. Many potential benefits of telemedicine can be envisaged, including: improved access to information; provision of care not previously deliverable; improved access to services and increasing care delivery; improved professional education; quality control of screening programmes; and reduced health-care costs.


reference: http://www.ncbi.nlm.nih.gov/pubmed/15829049

Case Study : Chapter 7

Questions to Consider

1.) Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
-Yes, because some of the defective software can still be used.

2.) What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
-Organizations should make sure that their products have good quality and durable to avoid negative consequences.

Discussion questions

1.)   With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life?  Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Seud?  Why or why not?
-Yes, because compared to the other missiles, Patriot missile is also strong.

2.) What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
-U.S. chose these countries because Israel and Saudi has a large desert areas.

3.) What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
-I've learned that safety-critical software can avoid  danger while testing other systems.

Case Study : Chapter 6

Questions to consider

1.)  Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?
-The Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies. Its members are the music labels that comprise the most vibrant record industry in the world. RIAA® members create, manufacture and/or distribute approximately 85% of all legitimate recorded music produced and sold in the United States.


reference: http://www.riaa.com/faq.php

2.)  Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
-No , because the Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies.


Discussion questions

1.) Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs.  Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.
-Lotus 1-2-3 is a spreadsheet program from Lotus Software (now part of IBM). It was the IBM PC's first "killer application"; its huge popularity in the mid-1980s contributed significantly to the success of the IBM PC in the corporate environment.
Quattro Pro is a spreadsheet program developed by Borland and now sold by Corel, most often as part of Corel's WordPerfect Office suite.

2.) The courts took several years to reverse their initial decision and rule in favor of Borland.  What impact did this delay have on the software industry?  How might things have been different if Borland had received an initial favorable ruling?
-Borland Software Corporation is a software company first headquartered in Scotts Valley, California, then in Cupertino, California, and finally in Austin, Texas. It is now a Micro Focus subsidiary. It was founded in 1983 by Niels Jensen, Ole Henriksen, Mogens Glad and Philippe Kahn.

3.) Assume that you are the manager of Borland’s software development.  With the benefit of hindsight, what different decisions would you have made about Quattro?
-If I'm the manager of Broland's software development. I will enhance the security system of Quattro so that it can be more useful.

Case Study : Chapter 5


Questions to consider


1.)   Does sexting represent a form of expression that is protected by the First Amendment?
- It is now a common practice for teenagers to be in constant communication with one another via text messaging. But when a "How are you doing?" turns into a sexual conversation with the exchange of explicit pictures, it is known as sexting. Some prosecutors are using child pornography and other felony charges against teenagers, while others believe sexting is protected by the First Amendment of the U.S. Constitution's Bill of Rights. Sexting is, indeed, just another form of expression which should be protected under the First Amendment.


reference: http://www.pointparkglobe.com/opinions/sexting-freedom-of-speech-or-child-pornography-1.1825510#.T7L2ROicCe0

2.)   What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?
-To protect people from the dangers of sexting, they need to :

*Understand why teenagers engage in sexting.
*Learn about the actual dangers of sexting.
*Educate your teen respectfully.
*Adopt a healthy digital environment at home, and engage in appropriate monitoring.


reference: http://www.reputation.com/reputationwatch/articles/how-prevent-teenagers-sexting-and-protect-them-other-teens-who-do



Discussion questions


1.)     Visit the EEF Web site at www.eff.org and develop a list of its current “hot” issues.  Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position.  Discuss whether you support this position and why.
-Patent Busting Project
      *The Patent Busting Project is an Electronic Frontier Foundation (EFF) initiative challenging patents that the organization claims are illegitimate and suppress innovation or limit online expression. The initiative launched on April 19, 2004 and involves two phases: documenting the damage caused by these patents, and submitting challenges to the United States Patent and Trademark Office (USPTO).
The EFF's basic assumption is that many such patents are invalid due to prior art which has historically been difficult to document in software and internet fields. (Many patent owners file patents to cover seemingly trivial concepts without any intention of enforcing the patents, but rather to use as part of a larger patent portfolio in their own defense against potential future patent lawsuits.)


reference: http://en.wikipedia.org/wiki/Patent_Busting_Project

2.)  What reasons might a firm give for joining and supporting EFF?
-Joining and supporting EFF is the Evergreen Freedom Foundation that helps promote a pro-growth agenda in any country. High growth generally benefits businesses.

3.)  The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor.  The CFO has asked if you, the CIO, support this action.  What would you say?
-I will say that I will support this action because it helps promote a pro-growth agenda in any country.

Wednesday 2 May 2012

Case Study : Chapter 4


Discussion Questions

1. What type of security breaches of medical record are commonly today?
-One type of security breaches are the viruses that destroys computers.

2. What measures are being taken by the government and private industry to safeguard EHR's?
-Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).


reference:http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_039956.hcsp?dDocName=bok1_039956

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
-ARRA layers on new privacy protections and prosecution powers to discourage unauthorized access to patient information. Under ARRA, even a brief unauthorized look at a medical record can mean large monetary fines for individuals and facilities. Through a wide range of provisions, Congress used ARRA as an attempt to increase patient trust that the healthcare industry will protect their personal information.

Discussion Questions

1. How does Google's business model use personal data?
-Google aims to be a databank for the government agencies to the CIA and the likes.Consumers are encouraged to use duckduckgo.com instead and use Free as in freedom software.


reference:http://www.ask.com/questions-about/Google's-Business-Model

2. What do you think are the major privacy concerns raised by Google's business model and applications?
-Google reported, for example, that a bug in Google Docs had allowed unintended access to some private documents. It was believed that 0.05% of all documents stored via the service were affected by the bug. Google claims the bug has now been fixed.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
-Google states, “We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search.”Cookies were initially thought to be only accessible by the website that held the cookies; however, with increased advertising technology and cookies  provided by these companies, information from cookies can be attained by those who want it. A detailed description of what different IP addresses search for can be created by Google. This practice does not respect the rights of informational privacy for Google users.


reference: http://www.ethicapublishing.com/ethical/3CH15.pdf