Wednesday, May 16, 2012

Chapter 10


Vignette ( Problems with Supplier)
Questions to Consider

  1. How can organization ensure that all the members of its supply chain will behave ethically?

Answer:
Manufacturers who use rare raw materials face another ethical issue related to the use of foreign suppliers: How to ensure that their suppliers do not funnel money to groups that engage in armed conflict or commit crimes and human rights abuses. Manufacturers of computers, digital cameras, cell phones, and other electronics frequently purchase rare minerals such as gold, tin, tantalum, and tungsten for use in their products. Unfortunately some of these purchases are helping to finance the deadliest war in the world today.

  1. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

Answer:
In addition to these fairly common business problems, hardware manufacturers are sometimes faced with serious ethical issues relating to their foreign affairs suppliers. Two such issues that have recently surfaced involve (1) suppliers who run their factory in a manner that is unsafe or unfair to their workers and (2) raw materials who funnel money to groups engaged in armed conflict, including some that commit crimes and human rights abuses.



Cases
Manufacturers Compete on Green Computing

  1. How have green computing efforts lowered the total cost of computer ownership?

Answer:
Apple claims to have the “green family of notebooks” and emphasizes the progress it is making in removing toxic materials from all of its computers. The public relations battle over which computer manufacturer is greener is heating up. Apple’s claim that it produces the “world’s greenest family notebooks”.
  1. Which approach can yield greater benefits—building greener computers or implementing programs that change user’s behavior so that they operate their computers in a more responsible manner? Explain your response.

Answer:
By doing implementing programs that change user’s behavior so that they operate their components in a more responsible manner, because by doing like that they must occurred yield greater benefits also can consume energy field by doing shut down their PC’s.

  1. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.
Answer:
Dell has introduced an ultra-green desktop computer called the Studio Hybrid. Its greenest desktop computer to date, the Studio Hybrid is Energy Star 5.0 qualified, has an 87% efficient power supply and an EPEAT gold rating. The Dell Studio Hybrid can be customized with interchangeable sleeves; there's even a sleeve available that's made from renewable bamboo. Dell has also made other strides toward becoming a greener technology company. Each year since 2004, Dell has increased its investment in renewable energy from wind, solar and natural gas capture. Dell has also made significant efforts to reduce its greenhouse gas emissions. Dell offers free recycling of Dell computers and will recycle other computer brands for free with purchase of a new computer. Dell also accepts donations of working computers from companies all around the world.
Apple is has begun to make many of its green computers with recyclable materials such as aluminum, polycarbonate and glass. Apple has made efforts to remove toxic substances, such as brominated fire retardants (BFRs), polyvinyl chloride (PVC), arsenic, lead and mercury from its products. Since 2008, the Apple MacBook Pro has been free from each of these dangerous environmental pollutants. By 2009, all Mac notebook and desktop computers had earned an EPEAT gold rating. The Apple MacBook Air, MacBook Pro and iMac and other Apple models also meet Energy Star 5.0 guidelines. Another green computer made by Apple is the Mac Mini, which is an extremely energy-efficient desktop computer. The Mac Mini uses less than 14 watts when idle, and is free from BFR, PVC and lead. Like Dell, Apple will recycle any computer for free with the purchase of a new computer. Apple has recycling programs in most of the countries where their products are sold.




Chapter 9


Vignette (Twitter Emerges as News Source for Iran Protesters)
Questions to Consider

  1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

Answer:
Yes because social networking Website is a site whose purpose is to create an online community of internet users that enables members to break down barriers created by time, distance and cultural differences. The members of an online social network may use the site to interact with friends, family member, and colleagues, people they already know but they may also wish to develop new personal and professionals relationships.

  1. How trustworthy is the information one gleans from social networks such as Twitter?

Answer:
It’s more trustworthy because this social networks is a method that has a deliver secure, private and reliable based on sound business practice, this is what organizations worldwide are demanding today, Twitter also is a social networking service that enables its user to send and read each other’s text-based posts.

Cases
Social Networking Disaster for Domino’s

  1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

Answer:
The advantage of hindsight might that domino’s have reacted more effectively because of the video issued, the video was apotramatic, they don’t know how the people insight them. And some observant believe that if an organization does not respond to an attack on its brand, then the damage has been done. Lack of management response is judged admission guilt.

  1. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?


Answer:
I find unusual that Domino’s response was primarily through the online media rather than the usual printed press releases because Domino’s ran into an unexpected delay in getting the video pulled from the YouTube site. It was told by YouTube that the signature of one of the employees who created the video was needed.

  1. Identify three lessons that other companies could learn from Domino’s experience.

Answer:
The employees responsible for the video were fired from Domino’s. Even though they claimed that the video was just a joke and that the food was never delivered, they were charged with food tampering and face future legal proceedings. Where the video was made, was closed for a day so that it could be completely sanitized—all food and paper products that were not sealed were thrown out.   

Chapter 8


Vignette (Western Cape Striving to Eliminate the Digital Divide)

Questions to Consider

  1. How important is access to ICT in children’s education?

Answer:
It is important to access the ICT children’s education by doing equipment reliable. Because ICT wants to organize or to provide each school with a computer lab. The goal of ICT is give the provinces also the cities, the schools to get or to flexibility in designing their education programs and initiatives.

  1. What are the barriers that stand in the way of universal access to ICT for everyone who wants its?

Answer:
The used equipment proved unreliable and difficult for the schools to maintain. The Khanya project team eventually decided to partner with NComputing, a for-profit company that specializes in creating “virtual desktop” via software and hardware connected to centralized networks. By using virtual desktop technology, a single computer can be shared among multiple users; each user connects to the computer through a device that is smaller than a paperback book, and each takes turns sharing the computer.


Cases
Technological Advances Create Digital Divide in Health Care

  1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

Answer:
In terms of that I can give an example from basis in US, but I will give it in a reality in the field in the Philippines. If that situation given in the Philippines I c an make sure that all the poor people can hospitalize in a public I can give it as a free for poor only, because they cannot afford that services, for only from a poor people. The goal of the program is to avoid health crises and reduces total expenses.

  1. Should health care organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

Answer:
No because not all person can afford the wealthy, not mention that only riches can afford it, but what about the poor they do not have much money to afford the privileges conduct a services, but if an organizations takes that for poor then why not but takes for poor only.

  1. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

Answer:
The irony of technological advances in medicine is that while they can prolong and improve the quality of life, they also create new standards and expectations, which could ultimately either push the healthcare system toward a financial crisis or increase the disparity between rich and poor.



Chapter 7


Vignette (Boeing Dream liner Faces a Few Bumps in the Road)
Questions to Consider

  1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customer’s and supplier’s unusual, or it’s common occurrence?

Answer:
Software problems in the automated baggage sorting system caused the system to go offline for almost two days. As a result, carriers in the terminal were forced to sort baggage manually experienced delays, flight cancellations and frustration. The breakdown reportedly occurred during a software upgrade, despite pretesting of the software. The system continued to experience problems in subsequent months.

  1. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

Answer:
Unfortunately, the first release of any software rarely meets all it user’s expectations. Software products do not usually work as well as its users would like it to until it has been used for a while, found lacking in some ways, and then corrected or upgraded.



Cases

Patriot Missile Failure

  1. With the benefit of hindsight, what steps could have been taken during development of the patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not

Answer:
The patriot missile is launched and guided to the target through three phases. First, the missile guidance system turns the patriot launcher to face the incoming missile. Second, the computer control system guides the patriot toward the incoming missile. Third, the patriot missile’s internal radar receiver guides it to intercept the incoming missile.


  1. What ethical decisions do you think the U.S military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

Answer:
Patriot battalions were deployed to Saudi Arabia and then to Israel to defend key assets, military personnel and citizens against Iraqi scud missiles. During the conflict, Iraq launched 81 modified Scud ballistic missiles into Israel and Saudi Arabia. The Iraqis modified the Scud missile to increase its range and boost its speed by as much as 25 percent. They reduced the weight of the warhead, enlarged the fuel tanks, and modified its flight so that all of the fuel was burned during the early phase of flight rather than throughout the flight’s duration.

  1. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

Answer:
Development could applied to a business information system software through benefits of informing by doing exactly modified software to fix the inaccurate time calculation, it won’t delay to the difficulties of arranging air and ground transportation during wartime.

Chapter 6


Vignette (RIAA Fights Music Piracy)

Question to Consider

  1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

Answer:
The RIAA reserves the right to sue flagrant copyright offender, they stand also the copyright infringement that stands for a violation of the secured by the owner of a copyright. Infringement occurs when someone copies a substantial and material part of another’s copyrightened work without permission.

  1. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?

Answer:
The ISP will either forward RIAA copyright infringement notices to its subscribers or notify its customers about the notices and ask them to cease desist. The ISP can take a series of escalating sanctions against repeat offenders, ranging from slowing down the subscriber’s network speed to terminating service. The RIAA reserves the right to sue flagrant copyright offenders.

Cases
Lotus vs. Borland

  1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

Answer:
Look and Feel example is the GUI or known as a Graphical User Interface by providing differences applications with a consistent set of intuitive user interface components. GUI enable users to spend less time trying to remember which keystroke sequences perform what functions, freeing up time that can be spent using the program in a productive manner.

  1. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?

Answer:
The ruling was welcomed by Borland, which would have found it extremely difficult to pay the estimated $100 million in damages sought by Lotus. Borland is still in business, providing products and services targeted to software developers, including a Borland version of the C++ programming languages.

  1. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?

Answer:
I would made about Quattro, I would decided to be the same to be the same about company of lotus, because lotus has a significant for the software industry, which had been riddled with infringement lawsuit due to ambiguities in copyright law. And also lotus has a popular spreadsheet program.

Chapter 5


Vignette (Sexting)
Questions to Consider
  1. Does sexting represent a form of expression that is protected by the First Amendment?

Answer:
In these cases, there’s no legal recourse for anyone to take to stop that person. In the meantime, underage participants those who have the least life experience to help them make good decisions are being held accountable. Until we learn how to deal with this new phenomenon appropriately in homes, in schools, and in the courts, many teens and young adults will likely continue to get hurt.

  1. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?

Answer:
The right to freedom of expression is one of the most important rights for free people everywhere. Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.


Cases
The Electronic Frontier Foundation (EEF)

Discussion Question
  1. Visit the EEF Web Site at www.eff.org and develop a list of its current “’hot” issues. Research one EEF issue that interest you, and write a brief paper summarizing EEF’s position. Discuss whether you support this position and why.

Answer:

  1. What reasons might a firm give for joining and supporting EEF?

Answer:
EEF’s mission includes educating the press, policy makers and the general public about civil liberties. It provides an extensive collection of information on such issues as censorship, free expression, digital surveillance, encryption and privacy. Most of EEF’s annual operating budget comes from individual donations from concerned citizens. EEF also has relationship with many IT-related organizations that provide it with hardware, software, and IT services.

  1. The vice president of public affairs for you midsized telecommunications Equipment Company has suggested that the firm donate $10,000 in equipment and services to EEF and become a corporate sponsor. The CFO has asked if you, the CIO support this action. What would you say?

Answer:
If I am the CIO I will support the sponsors, hope to do a better job of minimizing the negative impacts of IT on society, help IT users become more responsible in fulfilling their role and responsibilities, and eventually build a more knowledgeable marketplace for their products. 

Wednesday, May 2, 2012

Chapter 4 VIGNETTE “Privacy Concerns Abound with New IRS System”


1.    What information about you is being held, who is holding it, and what is this information being used for?

Answer:
            A clerk shopping into the records of a friend, a neighbor, or an ex-spouse. These incidents are not widespread and involve only a tiny fraction of employees. This data is a tempting target for identity thieves. Moreover , the money they collects funnds that federal government. On the other habd, information about people is gathered, stored, analyzed and reported because organizations can use it to make better decisions.

2.    What measures are being taken to safeguard this information, and what happens if it is inadvertently disclosed or deliberately stolen?

Answer:

            The auditors fund that the disaster recovery plan was deficient and that the systems were vulnerable in other ways backup tapes stored at an off.site location were not being tested regularly to check that data had been retrived correctly and should be used to restore the system if necessary. Many people object to the data collection policies of government and business on the basis that they strip individuals of the power to control their our personal information.


CASE STUDY CHAPTER#4 “Is Google Watching You”

Discussion Question
1.    How does Google’s business model use personal data?

Answer:
      It is not surprising that Googleinspires a host of privacy concerns. First and perhaps foremost is the concern generated by the wealth of personal information Google is able to assemble using user’s login identity.

2.    What do you think are the major privacy concerns raised by Google’s businessmodel and applications?

Answer:
      Other privacy concerns have arisen over the malfunctioning of Google’s applications. For example, on february 24,2009, an employee of a Dutch marketing firm reported  bug related to Google’s document with sharing applications, Google Docs.

3.    Do you think Google has taken adequate measures to protect it user’s privacy?

Answer:
      The corporation argued that Google had pledge to keep it user’s personal information private and that to handing over this data, the company would be forced to reveal trade secrets regarding its search technology. The best way for user to prevent the taken adequate measures is protect from its users privacy.