salazar's blog
Thursday, May 17, 2012
Chapter 9: Twitter Emerges as News Source for Iran protesters
Vignette
1. Many people question the value of Twitter’s goal
of helping people stay connected in real time. Do the events in Iran illustrate
the potential value to society of social networking tools such as Twitter? Are
there other ways that Twitter and other social networks could be used by people
and organizations to add real value?
Twitter is owned by the company called Obvious. They don't have many products, just Twitter. They operate a blog. [ It was opened publicly in July 2006 and its their only international product currently.
http://www.weegy.com/?ConversationId=65879100
2. How trustworthy is the information one gleans from social networks such as Twitter?
Twitter is owned by the company called Obvious. They don't have many products, just Twitter. They operate a blog. It was opened publicly in July 2006 and it’s their only international product currently.
http://wiki.answers.com/Q/Who_owns_Twitter#ixzz1uERcDbR7
Social Networking Disasters for Dominos
Discussions Question:
1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
3. Identify three lessons that other companies could learn from Domino’s experience.
Wednesday, May 16, 2012
Chapter 8: The Impact of Information Technology On Productivity and Quality of Life
Vignette
1. How important is access to ICT in children’s education?
ICT is a global phenomenon, and children who are computer literate at an early stage of their lives might deal better with the modern world. A sound knowledge of ICT makes it much easier for children to find and organize information. An Office for Standards in Education (Ofsted) funded study (2009) that took place between 2005 and 2008 identified good practices in the teaching of ICT. Although the ICT curriculum was sometimes poorly balanced, its use contributed to children doing better in some subject areas. The study also found that the primary school children spent as much time on computers as the curriculum allowed.
http://www.ehow.com/about_6612110_importance-ict-primary- education.html
2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
Technological Advances Create Digital Divide in Health Care
Discussion Questions:
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness. “At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity.
http://www.weegy.com/?ConversationId=9771CF9C
2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?
Yes they should, we all pay our bills to health care but not have improved services.
3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?
Drawbacks of telemedicines are that they can be expensive and may or may not be completely covered by every insurer. Demand of telemedicine is pretty high as well. Situations where telemedicine might not be useful might be to the elderly.
http://www.chacha.com/question/what-are-the-drawbacks-of-telemedicine-what-situations-might-not-lend-themselves-to-telemedicine-solutions
Tuesday, May 15, 2012
Chapter 7: Sofeware Development
Vignette
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Yes, because not all software products are 100 % not damage or some have defect.
2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
For me it is better to insure the good quality and high performance level of the product because these are the important factors on which customers make purchasing decisions, and to meet the needs and wants of the consumer.
Patriot Missile Failure
Discussion Questions:
1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Seud? Why or why not?
2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
I think the main reason why the U.S military made in choosing to deploy the patriot missile to Israel and Saudi Arabia because deploying missiles is the one way of detecting enemies, or radar for short.
3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Safety –critical software must also be prioritized because as a user we don’t know how safe the system was, once it fails it changes the environment of the system that can cause delays.
Chapter 6: Intellectual Property
Vignette
1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?
Of course it helps the music recording industry because the RIAA works to protect the intellectual property and first amendment rights of music labels, so having this it lessen the piracy in our society and we can assure that we can buy, avail an original copy not the piracy one.
2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
No, because RIAA says that the music industry has fully embraced the Internet as a major channel for distribution to consumers, the group has called on the Federal Communications Commission, they can also help to lessen piracy through internet.
Lotus v. Borland
Discussion Questions:
1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.
In both Excel and Lotus 1-2-3, you can perform a operation, such as sorting, on a range of multiple cells. A cell in the smallest container of data in a spreadsheet, the intersection of a row and column. In Excel, if you wish to manipulate a series of cells, you must first drag your mouse over them to select the entire range, then process a command, such as sorting. However, in Lotus 1-2-3, this order is reversed. First, select command, then select cells.
2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?
In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.
3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?
Assuming that I’m the manager of the Borland’s software development I will make sure that all my employee are well oriented because it helps to maintain the secrecy of my company and all my trade secrets.
Chapter 5: Freedom of Expression
Vignette
1. Does sexting represent a form of expression that is protected by the First Amendment?
Yes, for me sexting represent a form of expression that should be protected under the first amendment because sexting is an expression which is not allowable everywhere. Some victims of this are those people who are still young and fun of entertaining unknown person or stalkers and also teenagers who are not aware of the things around them.
2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?
For me we ourselves only can protect us from danger of sexting, and first thing to be done is to avoid entertaining those people who are the sexting master or founder by not replying to the text spam that what they have sent to you.
The Electronic Frontier Foundation (EEF)
Discussion Questions:
1. Visit the EEF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why.
Coders' Rights Project
EFF's Coders' Rights Project protects programmers and developers engaged in cutting-edge exploration of technology. Security and encryption researchers help build a safer future for all of us using digital technologies, but too many legitimate researchers face serious legal challenges that prevent or inhibit their work. These challenges come from laws such as the Convention on Cybercrime, the Digital Millennium Copyright Act, the Computer Fraud and Abuse Act, similar state laws, and computer crime laws in many countries around the world.
The Coders' Rights Project builds on EFF's longstanding work protecting researchers through education, legal defense, amicus briefs, and involvement in the community with the goal of promoting innovation and safeguarding the rights of curious tinkerers and hackers on the digital frontier. We also provide policy advice to decision-making officials who are considering new computer crime legislation and treaties.
For me I support this position because first of all I am an Information Technology student and I understand the situation of those people who are involve or part of the coders rights stated at the top. I may not a good coder/programmer but still I have the heart of an IT student and still they should respect our rights as an programmer and a solution provider. I believe being a coder provides and give good ambiance in our world in terms of technology.
2. What reasons might a firm give for joining and supporting EFF?
Honestly I am not active or being attentive in this kind of aspect like for example joining and supporting EFF, but I think the main reason why they propose people for joining and support EFF is to support each other for our freedom or shall I say for our freedom of expressions. We all know not all personal problems/expressions can be heard, entertained and in order to be heard and entertained by other we should support and help each other for the sake of our rights.
3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say?
I think I am not at the right place to answer this question, but still if I have given a chance I will support this action because it can help a lot.
Wednesday, May 2, 2012
Chapter 3 and Chapter 4:
Chapter 3: Computer And Internet Crime
Vignette
Trading Scandal at Society General
1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?
If you didn’t make the rule, break the rule. Trading guidelines that don’t come from the hard-won personal experience don’t lead to self-growth. Don’t let the internalized trading police force you into trading in a socially approved manner.Don’t let the inner and outer voices of tyranny control your trading
2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?
I think the explanation can there be for the failure of SocGen's internal control system to detect kerviel's transaction while Eurex detection many suspicious transaction is that the issue of collusion and indicating even more widespread weaknesses in internal controls.
Whistle-Blower Divides IT Security Community
Discussions Questions and Answers
1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?
For me Yes, because when Mike Lynn knows about the hacking of the CISCO routers, he decided to reveal the secrets about it and let other people know about it.
2. Do you think that CISCO and ISS were right to pull the plug on lynn's presentation at the black hat conference? Why of why not?
I think No, because as what I have understand Mike Lynn's presentation at the black hat conference is the key for the others to know the information that Mike Lynn's discover.
3. Outline a more reasonable approach toward communicating the flaw in the CISCO routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.
Chapter 4: Privacy Concern Abound with New IRS Systems
Vignette
1. What information about you is being held, who is holding it, and what is this information being used for?
2. What measures are being taken to safeguard this information and what happens if it is inadvertently or deliberately stolen?
For me to safeguard this information as a user we should be attentive in all times, we should be more wiser and be one step ahead in all the people in our surroundings/environment because if this will be stolen i thinks many changes will happen in our nation or may be in our life.
Case Study # 3: Is Google Watching You?
Discussions Questions and Answer
1. How does Google’s business model use personal data?
Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ]
http://www.weegy.com/?ConversationId=F53E8D73
2. What do you think are the major privacy concerns raised by Google's business model and applications?
The privacy concerns of Google business revolve around the ability of anyone around the whole having instant access to high-resolution imagery including personal property, houses, cars, etc. Having such imagery and photographs in clear detail showing cars (color, make and models) and people opens up a hornet's nest of privacy issues.
http://wiki.answers.com/Q/What_are_privacy_concerns_with_Google_Earth#ixzz1tiriWtDs
3. Do you think Google has taken adequate measures to protect its users privacy?
Yes, because of it's personal information.
Google is adamant that its changes, which users cannot opt out of, are perfectly legal and says they will result in a better online experience. The company has scrapped over 60 different privacy notices for various products and integrated their main tenets into a master privacy policy. It has also made the language of this document far easier to understand. And it has extended the way in which it shares information across its services to include YouTube and search histories so that people who, say, watch videos of a particular musician on YouTube will see adverts for that same performer's music when they are using Gmail or other Google products. Alma Whitten, the company's director of privacy, product and engineering, stressed in a blog post that these changes neither alter users' existing privacy settings nor result in more data being collected about them.
http://www.economist.com/blogs/babbage/2012/03/online-privacy
Subscribe to:
Posts (Atom)