Thursday, May 10, 2012

Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?

A. - In 2011, [ Supermicro introduced a major breakthrough in power supply technology with the industry's first SuperCompact (L220mm x W54.5mm x H40mm ) 1U 400W supply module conforming to Energy Star 2.0 specifications. Benefits As a result of these efforts, the Total Cost of Ownership (TCO) of Supermicro's servers and computer systems has decreased significantly over time. As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. [ Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels.

http://www.weegy.com/?ConversationId=8D859AA5


2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

A. - For me, I will agree to implement programs that change users behavior so that they operate their computers in a more responsible manner. It is the best approach that can yield greater benefits, it is because they can be a responsible user. Implementing programs like this can help them mold to a new person be a good user.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.

A. - As the result on my research the ACE Computer has the best green computing rating among other computer manufacturer.

Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave ethically?

A. - Before a person can be part of an organization it is a good way if a boss will know him/her better. Let him/her do some examinations about behaviour. Check all every little information about that certain person for the assurance. Once your in a world of business it is better if you will act and think equally about them.

2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

A. - The organization must check all the suppliers and business partners every month or even every week. They must be wise enough to know ensure that their partners and suppliers behave with a good ethics for the business sake. They must be good in handling them.

Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s

1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

A. - They must be disappointed of the result. It is the employee who do it and it is their responsibility to disciple all their employee. They must avoid this situation and they must improve their services.

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

 A. - Yes. It is effective because it seems that people were fun of using technology than reading newspaper. It is the best way to

3. Identify three lessons that other companies could learn from Domino’s experience.

A. -  1. Never let your employee do their work without your presence. 
        2. Make sure that you employ rules.
        3. Never trusted your employee.

Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

A. - Yes it is. Now a days people used social networking in different goals about themselves and about the other people. Some used it to destroy and to create chaos to them. Some used it to give and add real value to it.

2. How trustworthy is the information one gleans from social networks such as Twitter?

A. - I don't say that it is 100% sure.. I can only a sure 70% of it.
 

Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

A. - Inequality in economic resources is a natural but not altogether attractive feature of a free society. As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity.




http://www.weegy.com/?ConversationId=91CA1D2F

2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?


A. - For me I can say that it is a business that they want to gain profit. They create this for everybody but as what being observed only those who has money used this technology because they are the one who can afford to it.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions?



A. - Telemedicine is a vast subject, but as yet there are limited data on the clinical effectiveness and cost-effectiveness of most telemedicine applications. As a result, objective information about the benefits and drawbacks of telemedicine is limited. This review is therefore based mainly on preliminary results, opinions and predictions. Many potential benefits of telemedicine can be envisaged, including: improved access to information; provision of care not previously deliverable; improved access to services and increasing care delivery; improved professional education; quality control of screening programmes; and reduced health-care costs.

Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide

1. How important is access to ICT in children’s education?

A. - It is very important because it gives more knowledge to them. They are more advance in terms of education and in terms of technology. They gain more knowledge and as we know children today's generation  are more fun with technology and they learn easily with it than reading books.

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?


A. - For me it is the equipments that make as a barrier to them. The computers and other equipments are more expensive than books etc.

Chapter 7 - Case Study 3: Patriot Missile Failure

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

A. - The first thing that they must do is to check the time if it is accurate because the main problem here is the accurate time that the missile will fall down. There are many country that uses this missile so there must be a good study.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

A. - The system should be well function for them to used it without any hassle and defect. They must also insure the system the has a good calculation of time.




3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

A. - The key lesson here is that the study must be accurate to the system and will function well.

Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

A.- For me it is a software problem. They create new software and they introduced it to the public without further study of a possible problem of this software. Time come to them that even their business was affected by this problem. The traveller which is their customer was hassled by the late flight or cancelled flights.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

A. - The best thing that they must do is to improved the software and use other facilities that can improved it. Before they create a new product they must find solution to the existing problem.

Chapter 6 - Case Study 3: Lotus v. Borland

1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.


  A. - For me the difference between excel and borlan is that, all the formula needed to compute for large quantity of amount can be very easy because it provides complete instructions for every formula. I like excel most especially that I can be able to run a Visual Basic application in Macro. It can be converted into access and vice versa.
                                

2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?


A. - It has a favor decision for Borland. Because they allow Borland without thinking of its consequences and infringement. The industry might be mad and confused for this decision.

3. Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?


A. - talking about ethics here, the best thing that I will do is to do the right things and if that right things will be block then I might resign for I know that it is all illegal and someday I might go to prison for this act if I will consider it.


Chapter 6 - Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?


A. -  For me it helps the recording industry. Well, I must say that it is the best way to destroy the piracy on internet. They have the right to stand strong on this law because they felt being insulted. They record that song nor create that movie for them to gain profit but what they did is that they just downloaded it freely on net.
                                       
2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a
negative impact on the ISP?


A. - Yes it has. The ISP cannot download any movie or music freely. If they want it then they must pay for this.

Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.


A. -
This Week in Internet Censorship: India, Iran, Brazil, Russia, and More

Iran Continues March Towards “Halal Internet”

This past weekend, Iran’s minister of telecommunications announced that domestic institutions including banks, telecom companies, insurance firms, and universities are now prohibited from dealing with emails that do not come from an “.ir” domain name. This means that customers who use foreign email clients such as Gmail, Yahoo!, and Hotmail will have to switch to domestic Iranian accounts, which are subject to Iranian legal jurisdiction.
The foreign email ban is the latest development in what is widely thought to be a transition towards a “Halal” Iranian Internet. The Iranian Telecommunications Ministry has denied “shutting off the Internet” for its residents, but what differentiates this email limitation from previous ones such as the restriction on secure (HTTPS) traffic is its overt nature.

Ustream Adds Russian-Language Option In Response to Crippling DDoS Attack

Livestreaming website Ustream.tv received a massive distributed denial of service (DDoS) attack on the morning of May 9 that reportedly targeted the prominent user “reggamortis1,” a Russian citizen journalist who covers opposition protests and rallies, and is associated with Occupy Moscow. The attack rendered Ustream unavailable for about 10 hours—and the reggamortis1 channel continued to be inaccessible for several hours afterwards.

Brazilian Paper Uses Trademark Law to Silence Parody Website

Falha de São Paulo, a parody website of the major Brazilian newspaper Folha de São Paulo, has been engaged in an ongoing legal struggle with its object of its satire. In September 2010, Folha filed a lawsuit against the Falha website for “moral damages” to its reputation as a news organization. Folha also sought financial compensation for Falha’s mimicry of their layout and copy-editing. This case resulted in a “tie” for both parties: Falha’s domain remained frozen for unauthorized use of Folha’s intellectual property, but the rest of the suit was dropped in accordance with existing Brazilian legal precedent.

Indian Government Demands VoIP Interception Capability In the Next Month

Indian government has ordered Internet service providers to provide a way to intercept and identify the end user on unregistered VoIP calls within the next month. Currently, ISPs do not have to keep track of real-time user data, which, according to the government, exacerbates security risks in a world of proliferating VoIP service providers who use varying connection frequencies.

Ayatollah Ali Khameni Victim of Iran’s Internet Censorship

Iran’s Ayatollah Ali Khameni has become the latest victim of Iran's Internet censorship regime. Indeed, the keywords that Khameni chose for the fatwa announcement last week against anti-filtering tools led to his own decree being blocked along with the Iranian websites where it was published.

 Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.

https://www.eff.org/deeplinks/2012/05/week-internet-censorship-iran-censors-internet-censorship-decree-indian-government
 
2. What reasons might a firm give for joining and supporting EFF?


A. - Aside for helping as a reason they can have also gain more profit because their firm can be exposed to the world of this foundation. They give and they used the name of this foundation.

3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?


A. - I think it is okay for the EFF and maybe they can have a better equipment and they can help a lot of people.

Chapter 5 - Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

A. - Yes.

                                            

2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?


A. - The first thing must be done is to educate people. As we see the cause of this problem is the individual who takes photos of her self nude or even text other people with messages that is not appropriate to them. Protecting people is useless unless he/she begin with her/his self.

Chapter 4 - Case Study 3: Is Google Watching You?

1. How does Google’s business model use personal data?

A. - Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. 


 http://www.weegy.com/?ConversationId=F53E8D73


2. What do you think are the major privacy concerns raised by Google’s business model and
applications?


A. - the major privacy concerns of the Google's business, First and  foremost is the concern generated by the wealth of personal information Google is able to assemble using a user’s login identity. To use Google products,users must first create a Google login through which they provide an e-mail address, or in

the case of Google e-mail service, a first and last name.Other privacy concerns have arisen over the malfunctioning of Google’s applications. For example, on February 24, 2009, an employee of a Dutch marketing firm reported a bug related to Google’s document sharing application, Google Docs.


                                          

3. Do you think Google has taken adequate measures to protect its users’ privacy? Explain
your answer.


A. - Google is changing its privacy policies as of March 1, 2012. User activity on its services will be tracked to improve advertising. Google justified its actions as a benefit to users, however. “When someone is searching for the word ‘jaguar,’ Google would have a better idea of whether the person was interested in the animal or the car. Or the firm might suggest e-mailing contacts in New York when it learns you are planning a trip there.”

http://www.weegy.com/?ConversationId=8FCB7E9F

Chapter 4 - Vignette: Privacy Concerns Abound with New IRS Systems

1. What information about you is being held, who is holding it, and what is this information
being used for?


A. - Information of a person is being kept from other people as well as the information that you yourself is holding. Some personal data about yourself is being used by them to know you better. Information like education background, personal information and works experiences.


2. What measures are being taken to safeguard this information, and what happens if it is
inadvertently disclosed or deliberately stolen?




A. - This must be keep from yourself alone. If it is being disclosed or stolen then some might used it for their self to act as you. Every person must have a privacy for herself and for others.

Chapter 3 - Case Study 3: Whistle-Blower Divides IT Security Community

1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?

A. - For me it is a yes. Why? because Lynn just want to give details to the people about the ISS and IOS. He was just responsible enough and he even resigned just to report the right thing. 

2. Do you think that Cisco and ISS were right to pull the plug on Lynn’s presentation at the
Black Hat conference? Why or why not?


A. - No. Lynn was just trying to present his report about this black hat thing. It only shows that Cisco and ISS were guilty and hiding something. They were not fair on this business and they only ruined their conference. As what they did there are a lot of questions that people wants to ask.


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that
would have led to the problem being promptly addressed without stirring up animosity among
the parties involved.


A. - Through reverse engineering, he discovered that it was possible to create a network
worm that could propagate itself as it attacked and took control of routers across the Internet.
Lynn’s discovery was momentous, and he decided that he had to speak out and let IT security
professionals and the public know about the danger.

Chapter 3 - Vignette: Trading Scandal at Société Générale

1. Peter Gumble, European editor for Fortune magazine, comments, “Kerviel is a stunning
example of a trader breaking the rules, but he’s by no means alone. One of the dirty little
secrets of trading floors around the world is that every so often, somebody is caught concealing
a position and is quickly—and quietly—dismissed…. [This] might be shocking for people
unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider
this: the only way banks can tell who will turn into a good trader and who won’t is by giving
every youngster it hires a chance to show his mettle. That means allowing even the most
junior traders to take aggressive positions. This leeway is supposed to be matched by
careful controls, but clearly they aren’t foolproof.”11 What is your reaction to this statement
by Mr. Gumble?



A. - Trading is one way of getting a business bigger as the owner's goal. When we talk about it, it means a lot of money that will continue to come within the business itself. Every person has all the right to show their capacity on their desire work. Every secret trade of a business has a big plan from the major people among the executives. This means money and everything has to be done according to the plan.




2. What explanation can there be for the failure of SocGen’s internal control system to detect
Kerviel’s transactions while Eurex detected many suspicious transactions?



 A. - SocGen trusted Kerviel that much that they don't detect any suspicious transaction of Kerviel. Eurex on the other hand suspected Kerviel because of the money he earned. He used his ability and his knowledge to make a bigger money and he used the secret trade for this transaction.