Saturday, 12 May 2012


Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing


1. How have green computing efforts lowered the total cost of computer ownership?


Answer:


For me, It will help reduced the power consumption of every computer and it is friendly to use.




2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

Answer:


For me i think both, it's because they will help the world to monitor if they have any bad behaviors has been done.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.

Answer:


EPEAT™ is an environmental standard and rating system that makes it easier for computer purchasers to buy high performance notebooks, desktops and monitors that meet stringent environmental criteria developed through a stakeholder consensus process supported by the U.S. EPA ENERGY STAR® programme.

LINK REFERENCE:

http://shop.lenovo.com/ISS_Static/WW/EMEA/merchandising/sitelets/Lenovo-Green/en/Green-White_paper_ONLINE.pdf


Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave ethically?


Answer:

For me the better results, communicate to assure that all of the employee such as the buyers or the managers need to train to ensure all of the policy to make the staff know the exact and to manage the supply chain.



2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?


Answer:

In the business their are suppliers and the customer. Suppliers they will create good relation to the customers to make a good deal, because if we able have a good relation to the customer they will help you to your supplier able to create more responsive chain related to the matter.




Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

Answer:

Domino’s were not so updated with regards to the social media. They just found out with someone commented on their blog. Then damage is going on. And customers are alarm that they view that video the customers are not to eat in pizza at Domino's in that case you will apologize.




2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

Answer:


Yes, for me it is powerful if you make any damage in online media to make necessary apology and if they will do that for me they will possibilities to bring back the damage that have done. 




3. Identify three lessons that other companies could learn from Domino’s experience.

Answer:


For me, first thing to do make update to  your surroundings and if they have find any problem you will action on it avoiding any problems and to be honest in your co-workers.





Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

Answer:


For me the Internet makes it difficult to determine identity and intentions, which makes investigations of trust particularly important in the online space. Because online communication is frequently anonymous, asynchronous, and different-place, the risks to deception being caught are few, and deceptive behavior online is considered to be more common than offline.






2. How trustworthy is the information one gleans from social networks such as Twitter?

Answer:


For this twitter a social networking site if any issues seen in the twitter they will post any words that can irritate a person they make it expand many people will against on you this site is not good for me.





Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

Answer:

Health care is a service that we all need, but just like food and shelter it is best provided through voluntary and mutually beneficial market exchanges. A careful reading of both the Declaration of Independence and the Constitution will not reveal any intrinsic right to health care, food or shelter. That's because there isn't any. This 'right' has never existed in America.




2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?

Answer:


Yes, for me they will make investments regards in service, because if they will make some improvements in telemedicine there services will grow and this will be serve as a good thing to do to make other people satisfied in their services.



3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine  solutions?

Answer:

Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.



Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide


1. How important is access to ICT in children’s education?

Answer:


According to ICT adviser Harriet Price it is no longer simply a case of thinking in terms of the benefits that an ICT-rich educational experience brings to children. She insists that technology is now such an important part of children’s everyday lives that a learning environment without it would be completely out of touch with their own realities.
A former primary school ICT coordinator, Harriet now works in Cambridgeshire as an ICT adviser. Two of the early years settings she supports, Histon and Homerton children’s centres have recently received the prestigious ICT accreditation mark from Becta – the British Educational Communications and Technology Agency.
LINK REFERENCE:


http://www.teachingexpertise.com/articles/the-benefits-of-introducing-young-children-to-ict-3072

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it

Answer:


To make the children learn more and give knowledge and they will develop their skills and also they will learn more they will find ways to progress their learnings.  





Chapter 7 - Case Study 3: Patriot Missile Failure


1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

Answer:


They use this to have testing of their missile to be as standard to compare other top missiles and to make sure that this is they like to use against the Scud.  



2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

Answer:


For me, the U.S military their are good in wars; but avoiding the missiles they will do their best to deploying the missiles that can use in war able to protect and to prevent killing another U.S army that's why they will deploying the missiles.



3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

Answer:


For me, safety-critical software will be tested it's because able to know if has a problem on it it will be review and to evaluate each software then must be able to examine it to make sure there are know such problem if they will release the software.




Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road


1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

Answer:

For me, Yes, because this is helping to develop a software and also to evaluate the products then if we work on this the problems will not affect to the customers.




2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:


You will examine all of your product to make sure that their are function well may cause a good quality on it also to review all of the data to make the products in a good condition after that you must secure all of your products to avoiding necessary problems.




Chapter 6 - Case Study 3: Lotus v. Borland




1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.

Answer:

As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.

2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?


Answer:


For me, the borland prducts are affect on it, it's because the sales will be loss this issue it can affect to the industry the supplier and the consumer as well in that case the developers will protect their product able to avoid such issues and to protect the business.


3. Assume that you are the manager of Borland’s software development. With the benefit ofhindsight, what different decisions would you have made about Quattro?


Answer:

For me, i will make sure that it is unique and to also to use other company, because if we sell our product to the other company we can find a better and much useful software.




Chapter 6 - Vignette: RIAA Fights Music Piracy



1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?

Answer:


The RIAA is helpful, it's because they will protect all of the original copies such as DVD's and CD's to prevent any illegal DVD's copies and to make the community growth without any illegals.




2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have anegative impact on the ISP?


Answer:


For me many illegals, like downloading music through the internet then after that they will use this to sale it that it's illegal this is not copyrighted, RIAA will do their best to protect the music not using any illegal issues. 




Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)


1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.

Answer: 


Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online including providing a guide to help you with strategies for keeping your identity private when you blog.
Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them.



LINK REFERENCE:

https://www.eff.org/about

Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.

LINK REFERENCE:

https://www.eff.org/deeplinks/2012/05/week-internet-censorship-iran-censors-internet-censorship-decree-indian-government




2. What reasons might a firm give for joining and supporting EFF?

Answer:


Helping for a reason they can have also gain more profit because their firm can be exposed to the world of this foundation.



3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?

Answer:

For me, I will give my best to make easier to manage to develop more the telecommunications equipment in the company.







Chapter 5 - Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

Answer: 


Maybe, because we all know that we covered by the law of freedom of expressions this is state in the law.


2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?

Answer:


For me, parents will protect their children's to avoiding any danders of sexting and they will disciplined them in the right ways.


Tuesday, 1 May 2012

Chapter 4 case study

HOW SECURE IS OUR HEALTHCARE DATA?

Discussion Questions:


1. What type of security breaches of medical record are commonly today?


Answer:


We have many types of security breaches, but the most common in are viruses and worms they are viruses that usually appear in the computers or any networks. 

2. What measures are being taken by the government and private industry to safeguard EHR's?


Answer:


The government has the Health Insurance Portability and Accountability Act (HIPAA), which is an important to protect the privacy of the healthcare and informations or data.

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

Answer:

For me,  the ARRA has some issues regarding the privacy specially in the health care and data. The security of the data should always be protected all the files inside.


Discussion Questions:


1. How does Google's business model use personal data?



Answer:


For me the main purpose in Google the advertisement of their business.



2. What do you think are the major privacy concerns raised by Google's business model and applications?


Answer:


For me the privacy concern in the Google is the personal informations using in the accounts.



3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.


Answer:


“Trust is hard to earn, easy to loose, and nearly impossible to win back.”
This statement seems to ring true in the constantly changing world of business. In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis. Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users. Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information. To certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure. This behavior is unethical because it does not “most dutifully respect the rights of all affected”
Chapter 3 case study 


COMPUTER AND INTERNET CRIME


QUESTIONS TO CONSIDER


1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

Answer:

Trading in different fields is full of opinions about the right way to trade. Trading should abound. If trading is as much about self-development as it is about having a proper profit and loss statement, then as a trader you need to rely more on your individual perspective than on collective opinion. "The rules of conduct are just an outer show of devotion and loyalty - quite confusing to the heart." To be impeccably loyal to a trading system like the issue being said by Peter Gumble, it tells confusing to your heart and your individuality. And when men rely on these rules for guidance, there comes a time of ignorance abounds.


Reference:

link: http://tradereducatoronline.com/2011/09/20/the-taoist-trader-breaking-the-rules/


2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Answer:

As I searched over the net. When the heads of SocGen discovered this, they could not believe this one man had managed to do so much, so surreptitiously. A person familiar with SocGen's board says: " Everyone is stupefied to this affair. SocGen had an image as the best French banking. What is striking here is the contrast between the mediocrity of the trader and the scale of the catastrophe." Jean-Pierre Mustier, the head of SocGen's investment banking division, spent hours interrupting Mr. Kerviel in the aftermath of his Icarus-like plunge that ended up costing the bank €4.9bn.

Reference:

link: http://www.ft.com/cms/s/0/927fe998-d5b2-11dc-8b56-0000779fd2ac.html#axzz1tgZ0NaYx


Discussion Questions


1. Identify and briefly discuss four reasons why computer incidents have become more prevalent.


Answer: 
               
Computers are having a incidents it's because they not using any security to protect the computers able to enter the computer easily and to delete all the files inside the computer or it will put a virus on it able to damage the software.


2. A successful distributed denial-of-service attack requires downloading software that turns 
unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be fined as a means of encouraging people to better safeguard their computers? Why or Why not?


Answer:


For me the owner will protect their programs to avoiding malicious hacker. Because the hackers will do their work to hack any sites or program that their like to avoiding that it's better to make protection to prevent any malicious hackers in any programs or sites.


3. Do you believe that spam is actually harmful? Why or why not?


Answer:


For me it's harmful, because spam is abusing an email system example if know one are sending an email for you but their are sending a message if you open that it can harm your computer we don't know if that message having also a virus that can damage your system we must be careful on it.


4. How ca installation of a firewall give an organization a false sense of security?


Answer:


For me installation of a firewall cam secure your business or any organizations would to access any networks. Because they are using firewalls to secure their networks. Example if any organizations would like to access i the network if that organization not identify of the network they will use the firewall to blocked or not gaining access on the network.


5. Some IT security personnel believe that their organizations should always employ whatever resources are necessary to capture and prosecute criminals. Do you agree? Why or why not?


Answer:


I  agree, because if the IT security do that they can capture any criminals that having a bad intention through the computers it can help also avoiding any malicious or bad intentions of any organizations.


Discussion Questions


1. There are some who think that the techniques tools used in the Dark Web project could be used in a way that could negatively affect our way of life. The executive director of the Electronic Privacy Information Center, Marc Rotenberg fear "the very same tools that can used to track terrorist can also be used to track political opponents. " What are some negative ways such tools can be used against U.S citizens? Do you think that this is reasonable fear?


Answer:


For me this dark web project can tracking any terrorist able to know if what are they doing if we know the terrorist are having planned we will know their planned we can intercept their communications in other terrorist to avoiding a bad intentions as well.


2. Identify three positive ways that this technology could be used to improve the performance      organizations or to help us i our daily lives.


Answer:


For me the positive ways that any technology used to improve their performance in organizations. To help them to make easier of their work using technology to communicate of their business having conversations using technology and helping them to make fast of their transactions.


3. Do a Web search to find current information about the dark web research being carried out UA, including information about the budget for this effort, the number of researchers current employed, and any new tool or techniques they've developed. Write a brief summary of your findings.


Answer:


For me findings a information of the dark web to know that they having effort to make such new tools or techniques to developed any devices or technology we can avoid all of these getting their own informations. 


Discussion Questions


1. What harm does a worm cause to the public, Internet service providers, and e-mail service providers? Are there other reasons why many people object so strongly to the spread of worms?


Answer:


For me, Worms is a virus it is a harmful virus that can damage programs or systems in the computer they use this virus to sending copies of others if you open it the worm virus spread their are possibilities you will lost all of your data, programs other files that this virus can destroy.


2. What would you say or do if you received an email that guaranteed you $20 per month if you agreed to permit your computer to be used to send email during hours you are not using it?


Answer:


For me if that is their strategy to get the attention of it i will avoid that it's because you have nothing agreed something that they will give $20 per month you will not get their plan to do such bad intentions of sending an emails.


3. Do you feel it is objectionable to let others use your computer to execute your files without your prior knowledge or consent? What if ti were for a good cause, such as destroying a worldwide botnet, such as that created by the Storm worm, or running an application that analyze research data related to finding a cure for cancer?


Answer:


For me if you let others use your computer execute files without your consent your files will terminated you let others use your computer we don't know if that person has bad intention to do that or putting any kind of virus that can harm your computer. You will avoid that to secure your all files in the computer.


Discussion Questions


1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?


Answer:


For me  yes, because Mike Lynn do his job and remind all of them what is the possibilities that can cause damage of a property he is concern if what can do if that will happen he do his best for what is right for their country. 


2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?


Answer:

Cisco and ISS treated Mike Lynn is an unprofessionalism work. Cisco and ISS they have to face the problems regarding of their issues.


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.


Answer:


Mike Lynn discovered something that can create a worm in the network to attack and control all of the routers in the internet. 

Monday, 16 April 2012

Chapter 2 case study



Questions to Consider

1.     What message is sent to IT workers by the actions of New York Law School and colleague even if unrelated job-performance issues justified their actions in firing Gross and Perry?
Answer:

You will responsible to your actions to avoid mistakes. Then sent an email to New York faculty, staff, and students saying I'm saddened to report to you that I learned this afternoon that our colleague, professor Edward Samuel, was arrested on charges relating to possession of childhood pornographic images.and they were fired because of this incident. 


2.     Since the incident, a number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. Most of the laws state that worker who reports such a discovery is immune from any criminal, civil or administrative liability. Failure to report the discovery can result to a fine, imprisonment or both, do you think such laws will encourage reporting? Why or why not?

Answer:

For me, it will help this to avoid child pornography, because this is against the law that's why IT workers will help this situation to avoid that particular situations against that child pornography.  



Discussion Questions

1.     Hot to distinguish between a gift and a bribe? Provide an example of a "gift" that falls in the gray area between a gift and a bribe.

Answer:

Offering an IT works a gift that is actually intended as a bribe, Key characteristic that distinguish professional from other kind of workers: they required advance training and experience, they must exercise discretion and judgment in the course of their work and their work cannot be standardized.




2.     Discuss the following topic: law does not provide a complete guide to ethical behavior. An activity can be legal or not ethical.


Answer:

A code serves as a guideline for ethical decision making, promotes high standards of practice and ethical behavior, enhances trust and respect from general public and provides an evaluation bench mark.




3.     What is a professional malpractice? Can an IT worker ever be sued for professional malpractice? Why or why not?


Answer:

For me NO, from a legal perspective, IT workers are not recognized as professional because they are not licensed by the state of federal government. As a result, IT workers are not liable for malpractice.


4.     Review the PMI member code of ethics in appendix E. for each point in the code; provide an example of a project manager action that would break the code.


Answer:

The Project Manager Institute was establish in 1969 and has more than 420,000 members and the people who have passed the PMI certification process in more than 170 countries. Its members include project managers from such diverse fields as construction, sales, finance, and production, as well as information system. The PMI Member Code of Ethics and Professional conduct is presented in Appendix E.


5.     What must IT professionals do to ensure that the project they lead meet the clients expectations and do not lead the charges of fraud, fraudulent misrepresentation, or breach of contact.


Answer:

For me, in relationships between IT professional and clients’, key issues revolve around defining sharing, and fulfilling each party’s responsibilities for successfully completing an IT project.

6.     Should all IT professionals be either is licensed or certified? Why or why not?


Answer:

For me yes, because people cannot call themselves professional unless they licensed, and violator are subject to legal penalties.

7.     What commonalities you find among the IT professionals codes of ethics discussed in this chapter? What differences are there? Do you think there are any important issues not addressed by these codes of ethics?





Discussion Questions:

1.     The Incident illustrates some of the potential problems for small software developers working with the giant software manufacturers. To extend or enhance their products. Provide two good reasons why small developers should still consider working closely with the large software firm.


Answer:

For me, small developers should still working closely to the large software company to enhance their knowledge and develop some ideas each party’s develop solutions together.



2.     What measures could limit none have taken to better protect itself from Google's alleged actions? What measures could Google have taken to protect itself from this Lawsuit.

Answer:


The Google’s alleged an action is that they could have partnered with other company that would assure them that they will only use their products. The Google company should followed what was stated in their agreement with the Limit None so that their no wouldn't be any lawsuit that happened.





3.     Do research on the web to find out this case is proceeding in the courts. Write a short summary of   your findings.

Answer:

On February 4, 2008, the Court denied most of Microsoft’s requests. The Court ruled that it was not persuaded that Microsoft did not breach its agreement and that VERITAS had presented enough evidence to establish its trade secret rights in the private interfaces and other information. The Court also noted that VERITAS had provided credible evidence of bad faith, one in the form of an email summarizing a statement by one of Microsoft’s managers on the project, who admitted that: 

His intention is to eventually get [Symantec] out of the box because he believes we should not rely on any 3rd party for core components. Also, because the Court found that whether or not Microsoft’s


Discussion Questions:

1.     What actions should WMI have taken to lessen the risk of this project and avoid these problems?

Answer

For me, WMI should have to conduct an initial pilot of some of SAP’s software before signing the contract in order for them to lessen the risk of the project and to avoid some problems and they should undergo some research about SAP and test the said program.

2.     What sort of losses has WMI incurred from the delay of this project? How has the lack of success?
     On this project affected SAP?

Answer:

I think WMI didn’t loss anything because of the project delay and maybe the company has some problems namely slow processing of customer billing, collections, pricing, and customer setup. The lack of their success in their projects affects SAP’s because of delaying the project so WMI filed a case against SAP.



3.     Do research on the web to find out the current status of the lawsuits between WMI and SAP. Write a brief report summarizing your findings.

Answer:

SAP settles Waste Management lawsuit


By Dennis Howlett | May 3, 2010, 11:32am PDT


Reports are coming in that SAP has settled the two year old Waste Management lawsuit for an undisclosed sum. Back in March 2008:

The software maker sold Waste Management computer programs that were supposed to be designed to manage tasks unique to U.S. companies that haul waste and handle recycling, with no customization required, the lawsuit said.

Those programs handle tasks including billing, waste logistics, container management, and on-board computing, according to a December 2005 press release from SAP America.

“Unknown to Waste Management, this ‘United States’ version of the Waste and Recycling Software was undeveloped, untested, and defective,” the suit says.

As details of the lawsuit trickled out, it became apparent that the sales people had used a number of well known ‘industry tricks’ to entice Waste Management into buying what they saw as software unfit for their purpose and at a cost of more than $100 million. In its defense, SAP claimed:


Waste Management didn’t “timely and accurately define its business requirements” nor provide “sufficient, knowledgeable, decision-empowered users and managers” to work on the project.


Discussion Question:

1.     How can organizations and vendors change their certification programs to test for skills as well as core knowledge? What issues might this introduce?

Answer:

Any Manager would review these insightful points, yet they beg the question: What useful purpose can certification within organization?

Some CIO and vice president of technology assert that many employers use certification of training employees and increasing skills level within the company. Some companies are even using certification as a perk to attract and keep good employees. Such companies may also enhance their employee training programs by offering a job-rotation program though which workers can acquire certification and experience well.


2.     What are the primary arguments against certification, and how can certifying bodies change their programs to overcome these shortcomings?

Answer:

On June 13, 2005, do tenant, editor-in-chief of computer world, publish an editorial in favor of IT certification and was promptly hit. With a barrage of angry response from IT workers. They argued that testable .IT knowledge does not necessarily translate into quality IT work. A worker need good communication sand problem-solving skills as well as perseverance to get the job done well. Respondents explain that hardworking It workers focus on skills and knowledge that are related to their current project and don’t have time for certifications that will quickly become obsolete.



3.      What are the benefits of certification? How might certification programs need to change in the future to better serve the needs of the IT community?

Answer:


The benefits of certification is important, because if we have certificates we can find jobs to recognize to be an IT professional and also to apply other big companies and it can give good things to your self. 

Chapter 1 case study


Questions to Consider

1. Which issue is more disconcerting-the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? Defend your position.

Answer:

The more disconcerting is that there was one a board member has to leak their information about the HP in the news media. To have confidential issue's about the company to have an impact on its share price. That why they will hired an investigator to solve the problem.

2. Can the use of pretexting to gain information ever be justified? Is it considered legal under any circumstances?

Answer:

I think pretexting is illegal, because if you use this you can access to telephone records and targeted individuals Social Security Numbers to impersonate the calls of others through Phone Company to have a private records on it.

Discussion Questions

1. The are many ethical issues about which people hold very strong opinions-abortions, gun control and the death penalty to name a few if you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues would it affect your ability to work with this person? Why or why not? 

Answer:


For me if i have a team member on a project this is not effect of my ability to work of that person, because we have own opinions about any issues we respect each other we suggest each other to make a solutions about that particular issues has been discuss.

2. What do you think are the most important factors that helped you define your own personal code of ethics?

Answer:


For me Codes of Ethics is important, because if we have a code ethics we highlights a organization key issues and identifies the value and principles in decision making. And also to guide any employee's actions to abide by t law to follow the regulations and behave in an ethical manner.


3. Do you think that ethics in business is improving or getting worse? Defend your position.

Answer:

For ethics in business improving, because the risk associated with in a appropriate behavior have increased in their likelihood and to helping the organization to create more environment to make good of the community.

4. The ethics resource center identified five characteristics of a successful ethics program suggest a sixth characteristic, and defend your choice.

Answer:

For me I suggest that the employees are doing their best to make the company better. I suggest this characteristics to know that all employees are willing to make the company develop if they handle there sections well-being responsible to your legal actions. 


5. Which incident has a higher negative impact on a organization-an unethical act performed by an hourly worker or the same act performed by senior manager of the organization? Explain your answer fully. should the hourly worker be treated differently than the senior manager who committed the unethical act? Why or why not?

Answer:


For me both unethical incident has both a higher impact on an organizations, even they are not the same position they also commit a mistakes then if that the case they need to treated fair, because there are the same workers on the organization.

6. It is a common and acceptable practice for managers to hold people accountable to meet "stretch" goals, quotas, and budgets. How can this be done in a way that does not encourage unethical behavior on the part of employees.

Answer:

For me if the people accountable to meet "stretch" goals, quotas and budgets. This will be done if the employees will concentrate their work also of the behavior to be made their goals, quotas and the budgets handle well.

7. Is every action that is legal also ethical? Can you describe an action that is legal but ethically wrong? is every ethical action also legal? is the law, not ethics, the only guide that business managers need to consider? Explain.
Answer:

No, because there are sometimes an unethical part on every legal actions. sample of a legal but ethically wrong is you working on a private company and you are a programmer, your created programs are signed by the company and must be within the company only and that is legal. The ethically wrong doing is sharing your company's programs to other company and that us against ethics and it is illegal. They both have to consider the law and ethics, because for example company has laws, and ethics is barely needed to determine if the law is against ethics.


8. Do you think it is easier to establish an ethical work environment in a nonprofit organization? Why or why not?

Answer:

For me to establish an ethical work in environment i think it can help in nonprofit organization to them develop and to improve their company as well to make a highlight of a organization.

9. Think chapter discuss the four approaches to dealing with moral issues. identify and briefly summarize each one. Do you believe one perspective is better then others? if so, which one and why?

Answer:



Discussion Questions

1.     CA executives involved the accounting scandals were not accused of reporting bogus contracts or hiding major problems in business the contracts that were backdated were real sales agreements was this really a crime? should the individuals have been punished so harshly?


Answer:

For me just a business this is not a crime it's just a business you break the rules of your company you will accept sequences happen to you.


2.     In December 2004, CA appointed Patrick J. Gnazzo as a senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically, Gnazzo served in this role at United Technologies for 10 years and had been a member of the board directors of the ethics Offices Association .Gnazzo reported to a new executive vice president and a general counsel at CA as well as the board's Compliance committee. Outline some of the Actions Gnazzo might have been taken in his first six months on the job


3.     John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and President his first few months with the firm were rough- major customers threatened to dumb the firm some products were behind schedule and were of poor quality; executives had to be fired for breaking company rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. what sort leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?


4.     CA has been hit with numerous scandals since the late 1990's. these scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on this distractions. compare the revenue growth and stock price of CA to that of some of its competitors over the period 2004-2008 (be sure to use CA's corrected figures!) can you detect any impact of these scandals on CA's performance? what else might explain the difference in performance?



Discussion Questions
1. Identify at least two other companies that manage their suppliers in a manner similar to Dell computers. Do these companies have anything in common with Dell?

Answer:

The two companies that are similar to Dell Computers are the Hardcore Computer Inc. this company custom designs and manufactures liquid blade servers, professional workstations and desktop computers. These systems have a patented liquid submersion cooling technology to remove the main barrier of electronic performance heat. Hardcore Computer Inc. originally competed with the luxury PC gaming niche companies such as alien are, Falcon Northwest and MAINGEAR. However, with the launch of their LIquid Blade and Detonator line, the company is poised to complete with the big OEMs such as Dell, HP, Acer Inc. and Apple Inc. second, elite group Computer Systems Co. It is the fifth largest PC motherboard manufacturer in the world with production reaching 24 million units in 2002.

2. Can you identify any disadvantages for dell in taking the approach to managing suppliers?



Answer:




One of the disadvantages is their payment system, and the way pressures their suppliers. But I understand why they pressure their supplier for the good of their company, to catch the delivery on time. But they should pay suppliers in 30 days, not into 36 days, because they collecting payments from the customer ones they receives the order. But it's big company for them it's easy to replace or to find new suppliers.

3. Do you think that this approach to managing suppliers is unethical, or is it acceptable and ethical? Explain your reasoning.

Answer:

I think their approach to managing suppliers is ethical, because benefits it is started their that of carrying a minimal amount of inventory. When building a business, first step you make your own strategy that different from other companies, since their lots company build there are some competitions happen. But deals how you value the customer and supplier in good manner.

4. Would you recommend any changes to the way Dell manages suppliers? Defend your position.

Answer:

I recommend that they must do better manages in their company and also their supplier to make their company stronger if they have a professional to manage on it. And to me strategy's to make a necessary decision to help the company better.


Discussion Questions

1. Discuss how a CIO might handle Schrage's Scenarios using the suggested process for ethical decision making presented in this chapter.

Answer:


The CIO handle Schrage's scenarios by using an orientation to show them how to make decision right to have tough decision in ethical way, because if we not orient well our people they will make decision not according to plan the company well down.

2. Discuss e possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage's scenarios.

Answer:


On my own understanding short-term losses their standards for the business they small quantity. If the client not agree of their process, because they are not doing the right thing to do they not followed of any rules in the company.


3. Do you think that this approach to managing suppliers is unethical, or is it acceptable and ethical? Explain your reasoning.

Answer:


I suggest No, because if you gain a lot on your company or business in a way that is not ethical and it might be illegal or against the law of ethics they can benefit something but it is not the right process of gaining financial benefits, ethics is more important, because i believe if a company has ethics it financially benefits a lot.