Lunes, Mayo 14, 2012

Chapter 10 Case Study

Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave ethically?
Asnwer:
Your customers will always hold you responsible if your suppliers behave badly. Follow Smarta's three ideas to make sure your supply chain is as scrupulous about its ethics as your business is.

1. Create guidelines for your suppliers

While the jargon-tastic term 'ethical supply chain management policy' makes us shudder, the idea behind term is very sound: create a list of guidelines for those involved in your supply chain to ensure at every point, suppliers are observing best practice.

If parts of your supply chain are abroad, consult with local trade unions and NGOs to identify areas of concern. Take into account issues such as forced labour, whether the supplier allows trade union activity, workplace health and safety, workers' ages, wages, working hours, known cases of discrimination, and any history of inhuman treatment. Outline how you expect your suppliers to behave and what sort of conditions you expect to see in factories. See the Ethical Trading Initiative's (ETI) base code for inspiration.

For the best results, communicate your policy as much as possible: identify employees such as buyers or managers who will need training - but ensure the policy is available to all your staff so they know exactly how you manage your supply chain.

If you want to go the extra mile, take inspiration from Divine Chocolate and incentivise your suppliers into becoming more socially conscious. The business' suppliers all have a stake in the company - which means they have a vested interest in maintaining its ethical image.

2. Look out for suppliers' credentials

Your suppliers may say their practices are squeaky clean, but if they can't prove it, how can you trust them? Instead, find out if they have any certification: bodies such as the Fairtrade Foundation, the Soil Association, the Forest Stewardship Council, the Marine Stewardship Council and the Product Authentication Inspectorate (PAI) all have the power to determine whether a company's products can be deemed ethical or not.

Take a look at the Ethical Trading Initiative (ETI), Business Social Compliance Initiative (BSCI), Business in the Community (BITC) and Business for Social Responsibility (BSR) websites as well - all four feature lists of members with socially responsible credentials.

3. Waste

Making your supply chain ethical isn't all fair wages and eliminating child labour - how the chain deals with its waste is equally important. Ask your suppliers to cut down on unnecessary packaging - particularly if it's plastic - or look at more sustainable alternatives. The government's Waste and Resources Action Programme (WRAP) has made a voluntary agreement, called the Courtauld Commitment, with a range of British retailers, to cut down on waste. Its website lists targets and timescales supply chains should be aiming for.


2.What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
Asnwer:
Ethics are concerned with doing good, or the right thing in a given human situation (Wilson, 1975). In the business context, ethics has to do with the extent to which a person's behavior measures up to such standards as the law, organizational policies, professional and trade association codes, popular expectations regarding fairness and what is right , plus one's own internalized moral standards (Sauser, 2005). Business ethics are, therefore, concerned with an evaluation of business practices in the light of some concept of human value; it looks at corporate profits not for their own sake but with respect to the achievement of some human good.

Suppliers and customers need to be viewed as a partnership. The benefits of cooperation rather than conflict in buyer-supplier relationships include on-going cost reductions, quality improvements, increased operating flexibility and more powerful competitive strategies (Peck, Payne, Christopher & Clark, 2000). Customers who work more closely with suppliers will also be able to create a more responsive supply chain that can meet final demand in a timely manner.

Partnership is based upon commitment, trust and continuous improvement. Marketing attempts to create an impression of a personal relationship to customers even if the supplier does not know the customers or even meet them. It is a pseudo-personal relationship, but, all the same, it could be an efficient one (Gummesson, 2002). Several employees from both the supplier and buyers side are involved in the relationship. They are involved in negotiation, communication, bargaining, the transfer of goods, services and money. Ethical issues and personal values always influence such transactions.

Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?
Answer:
IT managers are increasingly seeking out suppliers of high performance, cost-effective and energy-efficient Green IT products. Their primary driver is economic: to reduce skyrocketing data center operational costs, a large proportion of which are energy related costs. As energy costs continue to escalate, users will need to spend significantly more to power and cool their server hardware than to purchase it.


"Earth-friendly" Product Advantages
Supermicro leverages advanced technology and system design expertise to reduce the power consumption of our server, blade, workstation and storage systems. Over many years of experience, we have become an industry leader in power saving technology. In 2006, for example, our 1U Twin™ servers were introduced featuring two DP nodes in a 1U form factor with 89% power efficiency. In 2007 our SuperBlade® systems built on this technology achievement to develop 93% power efficiency. In 2008 Supermicro's DatacenterBlade™ and OfficeBlade™ won Blade System Insight's "Best Green Data Center Solution" award for 93%+ power supply efficiency and our TwinBlade™ won Blade Systems Insight's prestigious "Best Blade-Based Solution" award in 2010 for the highest-performance/density Blade solution with 94%+ power supply efficiency.

Leading the way to even greater results, our engineers continue to improve green technology as a primary product design objective. In 2011, Supermicro introduced a major breakthrough in power supply technology with the industry's first SuperCompact (L220mm x W54.5mm x H40mm ) 1U 400W supply module conforming to Energy Star 2.0 specifications.

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
Answer:
In my opinion implementing programs that change users? behavior so that they operate their computers in a more responsible manner is the best approach that can yield greater benefits ,  in the manner that such programs will definitely change the attitude of every individual in the working environment with regards to operational procedures of computers thus resulting to responsibility education to the manpower through green operation that will in turn minimize the green house effect to the whole world itself.

3.Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 
Answer:
However, computing consumes energy and gives off waste heat and radiation. Green computing entry is the outcome that redefines the IT industry's effort deliver environmentally sustainable green computing products. IT products that reduce energy consumption yet efficient in operation are a valued commodity in the green computing market. It represents the best practices IT producers use to deliver environmentally sustainable green computing products. At Green Computing, we offer tips and information on green computing to help consumers in their product decision.

Chapter 9 Case Study

Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
Answer:I believe the benefits provided by social network sites such as Facebook have made us better off as a society and as individuals, and that, as they continue to be adopted by more diverse populations, we will see an increase in their utility. Anecdotal evidence of positive outcomes from these technologies -- such as political activities organized via Facebook or jobs found through LinkedIn -- is well-known, but now a growing corpus of academic research on social networks sites supports this view as well.Online social networking can facilitate identity exploration, provide social cognitive skills such as perspective taking, and fulfill the need for social support, intimacy, and autonomy. Whether constructing their profiles in MySpace, creating a video and posting it on YouTube, or talking in chat rooms, teens are constantly creating, recreating, and honing their identities -- a primary goal of adolescent development. This requires constant reflection on who they are, on who they want to become, and on their values, strengths, and weaknesses.


2. How trustworthy is the information one gleans from social networks such as Twitter?
Answer:
The warranting principle dictates that, when forming an impression, information provided by
third parties about a person is valued more than information they themselves provide. The
current study applies warranting theory to the popular “micro-blogging” site Twitter, where
people connect with others and share bursts of information. In light of the low signal-to-noise
ratio on the site and the recent shift towards citizen journalism, evaluating trustworthiness
trustworthiness was here considered to be an important consideration when considering if users
will “follow” someone (read their updates and interact with them in the future). In a survey of
Twitter users, support for the warranting paradigm with trustworthiness was not found on the
site. However, individuals still followed those they found trustworthy, lending support to the idea
that the warranting principle is confined to specific conditions. More generally, site-external and
site-external resources were more frequently used for evaluating self-provided than other-
provided information. Implications are discussed for future new media and CMC research.
Reference: http://usc.academia.edu/aschrock/Papers/198931/Are_You_What_You_Tweet_Warranting_Trustworthiness_on_Twitter


Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
Answer:
Customers who viewed the posted video eventually alarm and decided not to eat pizza at Domino’s. As the issues have been on air their response and apology are already too late and with regards to the social media there were not updated.

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
Answer:
Yes it is effective and appropriate way to responds like were this thing started.

3. Identify three lessons that other companies could learn from Domino’s experience.
Asnwer
Dominos, the pizza maker, became the latest victim of a viral video drive-by brand massacre. Yesterday, 2 employees from an individually owned franchise posted several disgusting videos on YouTube. To say the videos are inappropriate would be an understatement. One of the videos shows a staff member putting cheese up his nose before using it on the pizza he appears to be preparing for a customer. It gets worse from there. You can watch for yourself:
Once they became aware (more on how long this took later), the company worked to get the videos removed from the original hosting provider (doesn’t matter, as they have since been uploaded to other sites). Dominos then responded with email communications from Tim McIntyre, Vice President of Communications. He indicated how repulsed he was, and described that their security team was going to look into the matter to identify which store and responsible individuals.

Chapter 8 Case Study

Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide


1. How important is access to ICT in children’s education?
Answer:
Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners

2.What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?
Asnwer:
let the children learn, let them explore the technologies today for them to discover what the best for them it will also improve their skills in any field they want.


Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1.Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Answer:
Improving the health of the poorest people in the developing world depends on the development of many varieties of health innovations, such as new drugs, vaccines, devices, and diagnostic tools, as well as new techniques in process engineering and manufacturing, management approaches, software, and policies in health systems and services.

2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?
Answer:
Yes they should , we all pay our bills to health care but not have improved services.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?
Answer:
Drawbacks of telemedicines are that they can be expensive and may or may not be completely covered by every insurer. Demand of telemedicine is pretty high as well. Situations where telemedicine might not be useful might be to the elderly























Chapter 7 Case Study

Chapter 7  Vignette: Boeing Dreamliner Faces a Few Bumps in the Road


1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Answer:
not all software products are damage or have defects because if they supply their products with negative issues they can be sued.

2.What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:
As an organization develops plans and strategies to deal with the opportunities and challenges that arise in its particular operating environment, it should design a system that is capable of producing quality services and goods in demanded quantities in acceptable time frames.


Chapter 7 Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
Asnwer:
For me it's Yes by this part of overall effective testing and totally sealed to be as standard as compare top other missile.


2.What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
Answer:
By its missile deployments, and through this weekend's publicity, the US hopes to reassure its Arab friends. It seeks to de-fang Israeli hawks demanding swift military action. It wants to deter Iran, not fight it.Through deploying their missiles is much effective like a radar that they use.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Answer:
A safety-critical software system could be defined as any system whose failure or malfunction can severely harm people's lives, environment or equipment. These kinds of risks are managed using techniques of safety engineering. Safety-critical systems are widely used in various different fields such as medicine, nuclear engineering, transport, aviation, aerospace, civil engineering, industrial simulation, process control, military devices, telecommunications, infrastructures.



Chapter 6 Case Study


Chapter 6 - Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?
Answer:
the RIAA has taken legal actions against more then 40,000 people, mostly for copyright infringement for illegally sharing and downloading music via the internet some of the lawsuits threatened fines of tens of thousands of dollars alleged violators who challenged the RIAA in court risked being assessed crippling fines; thus most settled out of court

2. Could an ISP’s implementation and enforcement of the RIAA’s multi tier strategy have a
negative impact on the ISP?
Answer:
copyrighted works and any illegal activities through internet.RIAA says that the music industry has fully embraced the Internet as a major channel for distribution to consumers. The group has called on the Federal Communications Commission. It endorse efforts to curb illegal downloads of 










Chapter 6 - Case Study 3: Lotus v. Borland


1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

Answer:
For me the different in Excel from Borland is that, all the problems, procedures and formula needed to compute for large quantity of amount can be very easy, because it provides complete instruction for every formula and it is in its quality. I like Excel most especially that I can be able to run an Visual Basic application in Macro. But the only reason why the Borland Excel was being successful, because they just infringing the structure, commands, codes and all those stuffs according to survey, that's the reason they can gather some ideas on how to build same application more quality than the other.

2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?
Asnwer:
for me in this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3.Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?
Answer:
 If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an invistagetion in court you are assuredly obliged to face the court as a managerin your company and aside to face the court you will be put in prison




Biyernes, Mayo 11, 2012

Chapter 5 Case Study

Vignette: Sexting 

1. Does sexting represent a form of expression that is protected by the First Amendment?
Answer:
'Sexting' and other teen autopornography are becoming a widespread phenomenon, with perhaps 20% of teenagers admitting to producing nude or semi-nude pictures of themselves and an ever greater proportion, perhaps as many as 50%, having illegally received such pictures from friends and classmates. It is, moreover, beginning to result in criminal prosecutions, and the statutory penalties are severe. Given the reality of changing social practices, mores and technology utilization, today’s pornography laws are a trap for unwary teens and operate, in effect, to criminalize a large fraction of America’s young people. As such, these laws and prosecutions represent a stark example of the contradictions that can occur when governmental policies and initiatives built on past truths and values collide with new and unanticipated social phenomena.

2.What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?
Asnwer:
Legal regulation is often the routine, knee-jerk response to emerging societal concerns. However, imposing harsh, punitive restrictions on human behavior is not always the answer to these
social problems and often makes matters worse. And so it is with the phenomena of teenage “sexting.” Technology has once again outpaced the law, resulting in juveniles being publicly branded as sex offenders for relatively commonplace high school behavior. The use of stringent child pornography laws to punish children for activity that was never contemplated by lawmakers is ill-advised and has the potential to turn a generation of the growing population against ordered society.
Sexting, a combination of the words “sex” and “texting,” is the term coined to describe the activity of sending nude, semi-nude, or sexually explicit depictions in electronic messages, most
commonly through cellular phones.

This disturbing trend has generated some of the most notorious cases involving juveniles in recent years.While this behavior is perfectly legal and accepted among consenting adults, teenagers who
similarly experiment with this communicative outlet are often ragged into the judicial system by police officers, prosecutors, and judges. They reflexively categorize the activity as a child
pornography offense and proceed to utilize the strict laws designed to  protect children as devastating weapons  against them. Often, juveniles prosecuted for this behavior end up being included on the
public sex offender registry alongside the worst child molesters and pedophiles.

Case Study 3: The Electronic Frontier Foundation

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.

Answer:
Google has released a revamped version of its desktop search tool which introduces the ability to search the contents of one computer from another. Previous versions of the tool indexed files on user's PCs, but using the optional "Search Across Computers" facility in Google Desktop 3 temporarily stores text copies of searchable items on Google's ownservers for up to 30 days.

Search Across Computers makes a range of files - including web histories, Microsoft Word documents, Excel spreadsheets, power point presentations as well as PDF files and text files in the My Documents folder - searchable from other computers. The contents of secure web pages are excluded from the list. Users would log on using their Google password can find data on files they've worked on regardless of which PC they used to produce them. Users can also exclude certain file types or locations from indexing.


Even so, privacy activists such as the Electronic Frontier Foundation (EFF) have said the feature "greatly increases the risk to consumer privacy". It describes the facility as a gift to government snoops and a convenient "one-stop-shop for hackers" who've obtained a user's Google password. Users should avoid using Google Desktop 3, it advises.

Google argues that the growing use of multiple computers by users makes the feature useful. "Too many people are working across multiple computers now," Google vice president Marissa Mayer told USA Today. "This makes their lives easier."

In fairness, Google does acknowledge that the tool involves a trade off between functionality and security. That's a compromise Windows users have been stuck with for years, you might think. But even before the search engine behemoth was subpoenaed for search information by the Department of Justice, Google's latest desktop revamp would have raised eyebrows. The EFF, for one, is adamant users shouldn't trust Google with the contents of their personal computers.

"Unless you configure Google Desktop very carefully, and few people will, Google will have copies of your tax returns, love letters, business records, financial and medical files, and whatever other text-based documents the desktop software can index," EFF Staff Attorney Kevin Bankston said. "The government could then demand these personal files with only a subpoena rather than the search warrant it would need to seize the same things from your home or business, and in many cases you wouldn't even be notified in time to challenge it.




2.What reasons might a firm give for joining and supporting EFF?
 Answer:
It's been doing very good work, and you should examine the resumé of that work on the EFF web site. It's my firm belief that there is no greater catalyst for the success of a society than liberty. History tells that story again and again around the world. As new aspects of society -- and whole new societies -- are built online, the EFF's mission is to protect that liberty. The payoff, if it succeeds, is tremendous. A huge (but calculable) increase in economic prosperity and an incalculable dividend of personal freedom.
The EFF's primary cost is the staff, who because they work much harder than their salaries would warrant, are themselves all donors. This staff works to get the message out and organize the fight for digital liberty, and our on-staff attorneys make the difference in court and legislative battles on all fronts.


Miyerkules, Mayo 2, 2012

Chapter 4 Case Study

Discussion Questions

1. What type of security breaches of medical record are commonly today?
Answer  
there are many types of Security breaches today, the most common are viruses than can destroy yoy computers hard drives and files.

2. What measures are being taken by the government and private industry to safeguard EHR's?


Answer

Healthcare organizations are entrusted with the most private information of their patients and employees. They have a legal, moral, and ethical duty to protect all clinical and research information by ensuring that security and privacy safeguards are in place. A higher degree of control is necessary to prevent unauthorized access to especially sensitive information. This is particularly true within the context of the electronic health record (EHR).
This practice brief identifies categories of health information that are afforded special protections under law or may otherwise require a higher degree of security. It recommends system features and practices that will help secure sensitive information in EHRs and afford organizations satisfactory assurances that sufficient safeguards shield this information from misuse.

Reference:

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?
Answer
Within healthcare organizations, the temptation for some staff can be great: what harm can come from a peek at a celebrity’s health information or a next door neighbor’s record? At one time this act might have gone unnoticed, unrecorded, and without penalty.
But new privacy protection laws included in the American Recovery and Reinvestment Act (ARRA) have created the first federal punishment for such snooping.
ARRA layers on new privacy protections and prosecution powers to discourage unauthorized access to patient information. Under ARRA, even a brief unauthorized look at a medical record can mean large monetary fines for individuals and facilities. Through a wide range of provisions, Congress used ARRA as an attempt to increase patient trust that the healthcare industry will protect their personal information.
ARRA’s privacy provisions represent a “major change in privacy law,” says Deven McGraw, JD, LLM, MPH, director of the Health Privacy Project at the Center for Democracy and Technology, based in Washington DC. McGraw also serves on the Health IT Policy Committee, which makes recommendations on ARRA to the Office of the National Coordinator for Health Information Technology.
“The biggest [change] since HIPAA was enacted,” she says, “and there hasn’t yet been a lot of guidance coming out of the regulators about how to comply with both [state and federal law] and what the rules really mean. So this creates a lot of uncertainty in the marketplace.”
Across the country, providers reviewing the new ARRA regulations face the task of adapting their privacy policies and procedures to meet both state and federal requirements. This task is amplified in California, where just months ago healthcare privacy policies were overhauled with strict new state laws.
Prominent in California’s laws are tough new requirements on reporting privacy breaches and notifying individuals that their health information may have been compromised. California’s laws had been in effect approximately six weeks when the first-ever federal requirements on data breach notification were announced.
California’s HIM professionals have their work cut out to ensure their facilities meet both state and federal laws on notification, an exercise that all states with notification laws face.
Discussion Questions
1. How does Google's business model use personal data?
Answer
 Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics
Reference
2. What do you think are the major privacy concerns raised by Google's business model and applications?
Answer
I think the major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it
3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

Answer
Google has experienced a great deal of consistent growth since its beginnings in 1998.
Google’s initial product provided to the public was its search engine and searching capabilities.
Here the first instance of privacy issues can be seen. Google’s search engine, like almost every
search engine, monitors and remembers a user’s previous searches. The Google search engine
uses tracking cookies to allow for the gathering of information. A cookie is a file that the website
sends to your computer and stores data on while you use the site.Google states, “We use cookies to improve the quality of our service by storing user preferences and tracking user trends, such as how people search.”Cookies were initially thought to be only accessible by the website that held the cookies; however, with increased advertising technology and cookies  provided by these companies, information from cookies can be attained by those who want it. A detailed description of what different IP addresses search for can be created by Google. This practice does not respect the rights of informational privacy for Google users.