Total Pageviews

Tuesday, 15 May 2012

Chapter 10


Questions to Consider



1. How can an organization ensure that all the members of its supply chain will behave ethically?

For my opinion, maybe an organization should monitor their members for giving them the idea that they will behave ethically while doing their work, create some policies or procedure by which they will be obeying while staying at their company or industry.

2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

To have a good relationship from an organization and suppliers or business partners they must set some rules and limits from their relation, promoting sustainable development from both side, protecting their relation, respecting each ideas, having a good competitor relations, avoid non-regulating curricular and anticorruption practices.



Manufacturers Compete on Green Computing

Questions to Consider


1. How have green computing efforts lowered the total cost of computer ownership?

As a result of green computing efforts, the Total Cost of Ownership (TCO) of servers and computer systems has decreased significantly over time. Each of green computing 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels. As an example, each node of Supermicro's SuperBlade® can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade® can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees.


2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

It is better if the society don’t depend on implementing programs, because from what I’ve been observed, some people today don’t look programs that took their selves to change. Some just don’t mind it and depend on others, so it is better if the computer manufacturers give others the hands-on or the first step to move rather than depending on people who seems to ignore the changing of climate.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.

One of the best computer manufacturers with the best green computing ratings are:
-Dell that introduced a ultra-green desktop computer called the Studio Hybrid.
-Apple has begun to make many of its green computers with recyclable materials such as aluminum, polycarbonate and glass.
-Lenovo uses post-consumer recycled materials such as plastic water bottles in the manufacture of its green computers. Lenovo also uses recycled and recyclable materials for its product packaging.

Chapter 9


Questions to Consider



1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

I’ve described before how the social era has changed consumers expectations about how brands interact with them. Consumers want to see and hear the company’s responses from trustworthy employees. Crises like this are no different. In fact, it matters even more. Of course the corporate communications group will be involved in responding (and they should be), but what about the affected store manager? the individual franchise owner? the other employees that work there? Dominos is missing the opportunity to make consumers BELIEVE their side of the story because it isn’t human enough. The work that Scott Monty did last last year during the Ford Ranger Station controversy is a prime example. If consumers were to hear the message from some of the others Dominos employees I mentioned above, it could can help make a real connection, resonates, and build trust. So make it personal. Make it believable. Make it REAL.


2. How trustworthy is the information one gleans from social networks such as Twitter?

Everyone sees your status, privacy and even your commitment to life, from that you’ve been open to public that’s why a lot find issues and made it worst that cause fights, finds haters and bullies.

Twitter is owned by the company called Obvious. They don't have many products, just Twitter. They operate a blog. It was opened publicly in July 2006 and it’s their only international product currently.



Social Networking Disasters for Dominos


Questions to Consider


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

I think they seems to be more defensives from what their staff/employee done to the food, they should discipline their crews that they will have a neat looks and service to the public to avoid these kinds of situations.

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

There is no illegal step that the Domino’s Pizza done on the media sites, but from what they did, they sees by the viewers that they too expose from their actions. It is right for them to seek the legal counsel to see what kind of action they can take against them for damaging the brand, somehow they too much react on the situation that others sees them. And for my side, it would be better if the company leave a private chat or message to the owner of the site to avoid public critics.

3. Identify three lessons that other companies could learn from Domino’s experience.

Hopefully they learn how important it is to have an ongoing social monitoring program in place. Consumers expect them to do so. And the benefits of doing so, could have prevented some of the damage, and allowed them to respond individually to consumers who were talking. Pay attention to online conversation. It matters more than you think.

Digital Marketers and Social Media professionals often talk about the importance of listening aka online brand monitoring. Think of it as your brand radar or reputation protection. Had Dominos been engaged in doing so, they mostly likely would have learned about this event sooner, and been in a better position to deal with it.






Chapter 8


 Question to Consider


1.      How important is access to ICT in children’s education?

Access is important for ICT, because it is also becoming an important aspect in the employment sector and a tool for enabling citizen participation and social inclusion as more services, products and information becomes accessible by electronic means.


2.      What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

These are some of those barriers/circumstances that ensure the availability of universal access to ICT:
-All users are treated alike with no discrimination.
-There is no difference in services as well as the price or quality of services provided
to different users.
-Access is inclusive of all gender, ethnic, social or religious groups. There is no difference in service or tariffs based on geographic location, particularly
between urban or rural areas.
-There is special treatment for those wilt disabilities to ensure they have equal access
to ICTs and services.



Technological Advances Create Digital Divide in Health Care


Question to Consider


1.      Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

These are some of those examples that refutes or confirm the idea that a gap exist between the kinds of healthcare services;
-improve health
-safety
-equity outcomes
-provide medical providers with skills and strategies to change the social circumstances that shape the health of their patients.
Prevention Institute outlines an approach that community health centers can take to promote community health even as they deliver high quality medical services to individuals.


2.      Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

It seems that today, unfortunate people are increasing due to their uneducated status, poor country, poverty and over populated cities. These are mostly reasons that would be answer to the society at present. But having a cheap telemedicine would be better for the poor people who dreamed of their near death even having their mild illness.

3.      What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

Well some experts complain that there are actually quite a few of drawbacks of telemedicine. First of all, one problem is that many fear that it will take away from personal one on one time. Conferences and video can’t replace valuable time between doctor and patient or more personal discussion that doctors and physicians might otherwise have with each other.

Then we have clinical risk and over dependence on this telemedicine system. Due to the risks involved with what is reliable vs. unreliable information and over dependence or over use of telemedicine can easily get out of control until more uniformed strategies and procedures are put into play.

As you can see telemedicine is not yet all worked out where it can be utilized constantly or flexibly. But, it has enormous potential to be a tremendous asset to the world and all its civilizations. There is no arguing that the contributions it can make have endless possibilities however more time and effort will be needed to organize telemedicine for it to be confidently accepted.

Chapter 7


Questions to Consider

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

Yes, because the delay of new products is a big lose to suppliers and a waste of time for the customers. This scenario is unusual at manufacturer companies especially the attention is eyed to the Boeing Dreamliner because they boast and stated that they have the fast, fuel-efficient midsized airplanes but fails to deliver it on time and missed schedules.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

Maybe the organizations should know their manufacturers capability and don’t base their service on their machines and engines rather by checking their software of the manufacturer if it has no defect and dependable.



Patriot Missiles Failure

Questions to Consider


1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

The United State’s developer should know at first that the software is not at its perfection and secures the surroundings if they will hurt people if error occurs. This may be effective if this step would be improved the Patriot’s effectiveness.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

From the situation is, maybe at first the U.S. should visit the range of the missile to where it will deploy and if the deployment of the missile is restricted from the intruders or crowd.


3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

Incident reporting systems can support the development of safety-critical computer systems in a number of ways:
-Identifying common problems. Software and hardware developers may identify a number of bugs or potential failure modes in a developing design. Incident reporting systems provide a means of gathering this information so that it can be collated to find out if individual problems form part of a wider pattern. For example, every office may suffer the same problems from a particular faulty component.

-Communicating development concerns. Developers may also observe potential problems in their colleague's work and find it difficult to report these concerns. Anonymous or confidential incident reporting systems provide a forum for these concerns without necessarily exposing the employee as a `whistle blower'.

-Communicating lessons learned and best practice. Collated information can be exchanged between units do that best practice will be followed throughout a company. This not only applies to the recommendations in the aftermath of an adverse event but also to the ways in which previous failures have been detected and mitigated.

-Supporting risk assessment. The frequency of previous failures can be monitored using incident reporting systems. They probably only provide useful best case estimates as many adverse events may not be reported by personnel even if they observe them.


Chapter 6

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

RIAA is strongly against piracy, which holds the issue of megaupload. And I think they contributed a big help to the music recording industry lead to a jump in legal purchases as customers will turn to original music uploads.

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?

Both sides refer their institution that is related to internet services, but the ISP don’t look their selves to involved from those internet piracies they just provide and established a good internet connection, so there is no negative impact on the ISP from RIAA’s multitier strategy.

Lotus vs Borland

Questions to Consider


1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

They have significant differences, Quattro Pro is a Freeware. Lotus 123 is a DOS-program. MS Excel is by far the best from the choices because the script languages like VB-Script is compatible and powerful.


2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

If given the privilege to be the manager of the Quattro and i already know that it is illegal, I will resign my employment even if I owned a large amount of income every month, from time to time that the company that you were working on will be facing an investigations in court you are assuredly obliged to face the court as a manager in your company and aside to face the court you will be put in prison.

Chapter 5


Questions to Consider


1. Does sexting represent a form of expression that is protected by the First Amendment?

Sexting is somehow too considered as a freedom of speech, which is valid in form of expression. It is how adults and teens express feelings towards others.

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 

It is safe to avoid the pornographic images/videos to public and stay private to your friends. It is an inappropriate and illegal for teens to participate in sexting, to avoid these incidents maybe we should avoid distributing pornographic images/videos to stop attraction to child.

The Electronic Frontier Foundation (EFF)


Questions to Consider


1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why?

According to the Electronic Frontier Foundation, a digital rights advocacy group based in the US, there has been a proliferation of these phishing attempts on Facebook in recent weeks. For example, links have been slipped into the commentary boxes on pages visited by cyber activists; links which redirect the user to a fake page on the well-known social network, with a view to stealing their user names and passwords. I chose this issue because it concerns me on how this phishing incident widely spread on social network sites; even I was a direct user on different sites that concerns my privacy.
 

2. What reasons might a firm give for joining and supporting EFF?

As an involved in social networking site, it concerns me on how cyber activist are aggressive in stealing social networking accounts, who even my friend, family, relatives and I can be victim in this scenario.


3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say? 

If I the CIO support this action I am be serious about how the situation of slow delivering of communication occurs on daily to the people’s needs. I would be happier to continue the donation to EFF for a better midsized telecommunications.

Thursday, 3 May 2012

Chapter 4


Case Study


Discussion Questions
 1.      What type of security breaches of medical record are commonly today?

Prevent a Healthcare Security Breach with solutions from Imprivata. As more healthcare organizations move to electronic medical records (EMR), the chances of a Healthcare Security Breach increase significantly. Whether a security breach is intentional or inadvertent, such incidents violate the privacy of patients, damage the credibility of the organization, and may result in penalties for failing to comply with regulations concerning the protection of patient information.


2.      What measures are being taken by the government and private industry to safeguard EHR's? 

The Health Insurance Portability and Accountability Act (HIPAA) Security Rule  requires specific measures to safeguard your electronic protected health information to ensure its confidentiality, integrity, and security.
A few of the safety measures built in to electronic health record (EHR) systems to protect your medical record may include:
  • “Access control” tools like passwords and PIN numbers, to limit access to patient information to authorized individuals, like the patient's doctors or nurses.
  • "Encrypting" stored information. That means health information cannot be read or understood except by someone who can “decrypt” it, using a special “key” made available only to authorized individuals.

3.       How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

Discussion Questions

1. How does Google's business model use personal data?

 Google is firmly committed to the privacy of our advertisers and users. While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics.


2. What do you think are the major privacy concerns raised by Google's business model and applications?

 I think the major privacy concerns raised by Google's business model and applications are there technology was very open to the public and so others can sneak on it.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.