Sunday 13 May 2012

Chapter 10: Case Study



Problem with the Suppliers

Question to Consider

1. How can an organization ensure that all the members of its supply chain will behave ethically?

 for the organizations, to ensure that the members of its supply chain will behave ethically is make sure that your members are reliable and trustworthy . in this way, you'll be able to gain trust to them



2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

what thet must do is make sure that they will present their business partners professionally and be more serious to it, in this way, both of the parties behave ethically and with respect with each other.





Manufacturers Compete on Green Computing



Questions to Consider



1. How have green computing efforts lowered the total cost of computer ownership?

this green computer promotes eco-friendly . it means it is a low cost computer .by it, you'd be able to save and promote/save the ecosystem 



2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

i'd choose the implementing program that change users' behavior so that they operate their computer in a more responsible manner approach because this is the way to make a proper attitude and conduct as a user. rather than this green computer but no proper discipline. 

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.



Chapter 9: Case Study


Twitter Emerges as New Source for Iran protesters

Question to Consider

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

for me social network has some advantages and disadvantages . it enables to connect with your love ones even though you were far apart, but disadvantages to it. they were many cyber bully,cyber criminals that might hurt you emotionally with the use of this social networking websites. so , this websites have some good side and bad.  people tend to connect with each other. 

2. How trustworthy is the information one gleans from social networks such as Twitter?

the information in this social network are not accurately true. some users tent to make information in false . but some are not. for me,  make sure that the information being passed is true.

Social Networking Disasters for Dominos


Questions to Consider


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?


i think domino should be aware of his employee and how his management works. without lack of management the stakes is high.as a professional, be ready to figure what situation is going to happen.




2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

3. Identify three lessons that other companies could learn from Domino’s experience.


Chapter 8: Case Study


Western Cape Striving to Eliminate the Digital Divide

Question to Consider

1. How important is access to ICT in children’s education?

ICT is very important to children's educations because  first, it will enhance the children's creativity, enhance home/setting experience ,builds the child self esteem .

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

the barriers to it is what if your computer get a virus then it could cost to lose all your data which could be very important. so the computer it self is the disadvantage

Technological Advances Create Digital Divide in Health Care

Questions to Consider


1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?



2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

healthcare organizations should make investment to this telemedicine services.
because it really helps people from long distances .but in a affordable price.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions? 

for me the drawbacks in telemedicine is first, the breakdown in the relationship between health professional and patient, secondly is the breakdown in the relationship between health professionals . and lastly is quality of information issues .



Chapter 7: Case Study


Boeing Dream liner Faces a few bumps in the road

Questions to Consider
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?


for me, it is a common occurrence because some software faces some technical difficulties and it is common nowadays.


2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?.

in my opinion, as a user perspective.. first the organizations or company must simplify their program , offer trial version of it so that the consumers can rate the product and its development. and lastly make a strong documentation and tutorials. 

Patriot Missiles Failure

Questions to Consider

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

this missiles are made to deploy because it was made for the anti-aircraft purposes . by doing it, it enhances their defense system.  this were the steps they were making.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

my perception to this is, the US military choose to deploy patriot missiles in the middle east is because they were putting their defense system in order to dominate the countries they want to conquer with.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?.

this software is well advance . it has advantages and disadvantages . but it is a technology development and i must say that this software system is amazing. and must use it accordingly and with proper guidance . 

Chapter 6: Case Study



RIAA fights Music Piracy

Questions to Consider

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

 well basically the RIAA's goal is the copy right protection. making unauthorized copoes of copyrighted music recordings is against tej law and may subject you to civil and criminal liability



2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?

 in my opinion it has no negative impact. in fact it helps alot on monitoring the users online activity for illegal fire sharing. although , it is more like spying on what you are doing. :)

Lotus Vs. Borland


Questions to Consider

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.



2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?


3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

Chapter 5: Case Study


Question to Consider

1. Does sexting represent a form of expression that is protected by the First Amendment? 

if the particular sexting is legally "obscene," then the First Amendment does not protect it. The state and Federal laws that prohibit obscene materials would therefore apply. Today, however, obscenity prosecutions are extremely rare, partly because it is so hard to prove that sexual material is legally "obscene" under applicable "community standards."


2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights? 

Sexting is serious business. In some states in the US child pornography charges (second degree felonies) have been brought against teenagers who have sexted nude images. Senders of sexts may be arrested, face charges and may have to register as sex offenders!

The Electronic Frontier Foundation (EFF)


Questions to Consider

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF's position. Discuss whether you support this position and why?



2. What reasons might a firm give for joining and supporting EFF?

for me , the reasons why a firm join and support EFF is because it is a donor funded nonprofit group of passionate people. from lawyers, volunteers ,technologies and visionaries who depend on your support to continue successfully defending digital rights.


3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say? 


Wednesday 2 May 2012


Chapter 4 Case Study


Discussion Questions

1. What type of security breaches of medical record are commonly today?
  
for me data security is one of the common security breaches commonly occur today, it includes patients names, medical record numbers , ages, clinical information .. etc.

2. What measures are being taken by the government and private industry to safeguard EHR's?
     
some measures they do is commitment to strong community , a sharp focus on security policies and process helps

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data?      What breaches do you foresee? How can they be forestalled?
  
  for me the breaches i foresee is notification,accounting for disclosure, out of pocket payments and electronic copies of electronic health record

Discussion Questions

1. How does Google's business model use personal data?

 google's business model   is description of  a business and a plan to help the business move forward and become more profitable. in doing personal data,  it focuses about advertising related to internet searches


2. What do you think are the major privacy concerns raised by Google's business model and applications?

   i think it's about persons personal information,

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.

i yes because , every now and then, google do changes and they do everything whats necessary  to improve their applications and softwares.