Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing
1. How have green computing efforts lowered the total cost of computer ownership?
Answer:
For me, It will help reduced the power consumption of every computer and it is friendly to use.
2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
Answer:
For me i think both, it's because they will help the world to monitor if they have any bad behaviors has been done.
3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.
Answer:
EPEAT™ is an environmental standard and rating system that makes it easier for computer purchasers to buy high performance notebooks, desktops and monitors that meet stringent environmental criteria developed through a stakeholder consensus process supported by the U.S. EPA ENERGY STAR® programme.
LINK REFERENCE:
http://shop.lenovo.com/ISS_Static/WW/EMEA/merchandising/sitelets/Lenovo-Green/en/Green-White_paper_ONLINE.pdf
Chapter 10 - Vignette: Problems with Suppliers
1. How can an organization ensure that all the members of its supply chain will behave ethically?
Answer:
For me the better results, communicate to assure that all of the employee such as the buyers or the managers need to train to ensure all of the policy to make the staff know the exact and to manage the supply chain.
2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
Answer:
In the business their are suppliers and the customer. Suppliers they will create good relation to the customers to make a good deal, because if we able have a good relation to the customer they will help you to your supplier able to create more responsive chain related to the matter.
Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s
1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
Answer:
Domino’s were not so updated with regards to the social media. They just found out with someone commented on their blog. Then damage is going on. And customers are alarm that they view that video the customers are not to eat in pizza at Domino's in that case you will apologize.
2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
Answer:
Yes, for me it is powerful if you make any damage in online media to make necessary apology and if they will do that for me they will possibilities to bring back the damage that have done.
3. Identify three lessons that other companies could learn from Domino’s experience.
Answer:
For me, first thing to do make update to your surroundings and if they have find any problem you will action on it avoiding any problems and to be honest in your co-workers.
Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters
1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
Answer:
For me the Internet makes it difficult to determine identity and intentions, which makes investigations of trust particularly important in the online space. Because online communication is frequently anonymous, asynchronous, and different-place, the risks to deception being caught are few, and deceptive behavior online is considered to be more common than offline.
2. How trustworthy is the information one gleans from social networks such as Twitter?
Answer:
For this twitter a social networking site if any issues seen in the twitter they will post any words that can irritate a person they make it expand many people will against on you this site is not good for me.
Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Answer:
Health care is a service that we all need, but just like food and shelter it is best provided through voluntary and mutually beneficial market exchanges. A careful reading of both the Declaration of Independence and the Constitution will not reveal any intrinsic right to health care, food or shelter. That's because there isn't any. This 'right' has never existed in America.
2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?
Answer:
Yes, for me they will make investments regards in service, because if they will make some improvements in telemedicine there services will grow and this will be serve as a good thing to do to make other people satisfied in their services.
3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions?
Answer:
Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.
Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide
1. How important is access to ICT in children’s education?
Answer:
http://www.teachingexpertise.com/articles/the-benefits-of-introducing-young-children-to-ict-3072
2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it
Answer:
To make the children learn more and give knowledge and they will develop their skills and also they will learn more they will find ways to progress their learnings.
Chapter 7 - Case Study 3: Patriot Missile Failure
1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
Answer:
They use this to have testing of their missile to be as standard to compare other top missiles and to make sure that this is they like to use against the Scud.
2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
Answer:
For me, the U.S military their are good in wars; but avoiding the missiles they will do their best to deploying the missiles that can use in war able to protect and to prevent killing another U.S army that's why they will deploying the missiles.
3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Answer:
For me, safety-critical software will be tested it's because able to know if has a problem on it it will be review and to evaluate each software then must be able to examine it to make sure there are know such problem if they will release the software.
Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Answer:
For me, Yes, because this is helping to develop a software and also to evaluate the products then if we work on this the problems will not affect to the customers.
2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:
You will examine all of your product to make sure that their are function well may cause a good quality on it also to review all of the data to make the products in a good condition after that you must secure all of your products to avoiding necessary problems.
Chapter 6 - Case Study 3: Lotus v. Borland
1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.
Answer:
As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.
2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?
Answer:
For me, the borland prducts are affect on it, it's because the sales will be loss this issue it can affect to the industry the supplier and the consumer as well in that case the developers will protect their product able to avoid such issues and to protect the business.
3. Assume that you are the manager of Borland’s software development. With the benefit ofhindsight, what different decisions would you have made about Quattro?
Answer:
For me, i will make sure that it is unique and to also to use other company, because if we sell our product to the other company we can find a better and much useful software.
Chapter 6 - Vignette: RIAA Fights Music Piracy
1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?
Answer:
The RIAA is helpful, it's because they will protect all of the original copies such as DVD's and CD's to prevent any illegal DVD's copies and to make the community growth without any illegals.
2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have anegative impact on the ISP?
Answer:
For me many illegals, like downloading music through the internet then after that they will use this to sale it that it's illegal this is not copyrighted, RIAA will do their best to protect the music not using any illegal issues.
Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)
1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.
Answer:
Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online including providing a guide to help you with strategies for keeping your identity private when you blog.
Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them.
LINK REFERENCE:
1. How can an organization ensure that all the members of its supply chain will behave ethically?
Answer:
For me the better results, communicate to assure that all of the employee such as the buyers or the managers need to train to ensure all of the policy to make the staff know the exact and to manage the supply chain.
2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
Answer:
In the business their are suppliers and the customer. Suppliers they will create good relation to the customers to make a good deal, because if we able have a good relation to the customer they will help you to your supplier able to create more responsive chain related to the matter.
Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s
1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
Answer:
Domino’s were not so updated with regards to the social media. They just found out with someone commented on their blog. Then damage is going on. And customers are alarm that they view that video the customers are not to eat in pizza at Domino's in that case you will apologize.
2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
Answer:
Yes, for me it is powerful if you make any damage in online media to make necessary apology and if they will do that for me they will possibilities to bring back the damage that have done.
3. Identify three lessons that other companies could learn from Domino’s experience.
Answer:
For me, first thing to do make update to your surroundings and if they have find any problem you will action on it avoiding any problems and to be honest in your co-workers.
Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters
1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
Answer:
For me the Internet makes it difficult to determine identity and intentions, which makes investigations of trust particularly important in the online space. Because online communication is frequently anonymous, asynchronous, and different-place, the risks to deception being caught are few, and deceptive behavior online is considered to be more common than offline.
2. How trustworthy is the information one gleans from social networks such as Twitter?
Answer:
For this twitter a social networking site if any issues seen in the twitter they will post any words that can irritate a person they make it expand many people will against on you this site is not good for me.
Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
Answer:
Health care is a service that we all need, but just like food and shelter it is best provided through voluntary and mutually beneficial market exchanges. A careful reading of both the Declaration of Independence and the Constitution will not reveal any intrinsic right to health care, food or shelter. That's because there isn't any. This 'right' has never existed in America.
2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?
Answer:
Yes, for me they will make investments regards in service, because if they will make some improvements in telemedicine there services will grow and this will be serve as a good thing to do to make other people satisfied in their services.
3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions?
Answer:
Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.
Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide
1. How important is access to ICT in children’s education?
Answer:
According to ICT adviser Harriet Price it is no longer simply a case of thinking in terms of the benefits that an ICT-rich educational experience brings to children. She insists that technology is now such an important part of children’s everyday lives that a learning environment without it would be completely out of touch with their own realities.
A former primary school ICT coordinator, Harriet now works in Cambridgeshire as an ICT adviser. Two of the early years settings she supports, Histon and Homerton children’s centres have recently received the prestigious ICT accreditation mark from Becta – the British Educational Communications and Technology Agency.
LINK REFERENCE:
http://www.teachingexpertise.com/articles/the-benefits-of-introducing-young-children-to-ict-3072
2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it
Answer:
To make the children learn more and give knowledge and they will develop their skills and also they will learn more they will find ways to progress their learnings.
Chapter 7 - Case Study 3: Patriot Missile Failure
1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
Answer:
They use this to have testing of their missile to be as standard to compare other top missiles and to make sure that this is they like to use against the Scud.
2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
Answer:
For me, the U.S military their are good in wars; but avoiding the missiles they will do their best to deploying the missiles that can use in war able to protect and to prevent killing another U.S army that's why they will deploying the missiles.
3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
Answer:
For me, safety-critical software will be tested it's because able to know if has a problem on it it will be review and to evaluate each software then must be able to examine it to make sure there are know such problem if they will release the software.
Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
Answer:
For me, Yes, because this is helping to develop a software and also to evaluate the products then if we work on this the problems will not affect to the customers.
2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:
You will examine all of your product to make sure that their are function well may cause a good quality on it also to review all of the data to make the products in a good condition after that you must secure all of your products to avoiding necessary problems.
Chapter 6 - Case Study 3: Lotus v. Borland
1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.
Answer:
As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.
2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?
Answer:
For me, the borland prducts are affect on it, it's because the sales will be loss this issue it can affect to the industry the supplier and the consumer as well in that case the developers will protect their product able to avoid such issues and to protect the business.
3. Assume that you are the manager of Borland’s software development. With the benefit ofhindsight, what different decisions would you have made about Quattro?
Answer:
For me, i will make sure that it is unique and to also to use other company, because if we sell our product to the other company we can find a better and much useful software.
Chapter 6 - Vignette: RIAA Fights Music Piracy
1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?
Answer:
The RIAA is helpful, it's because they will protect all of the original copies such as DVD's and CD's to prevent any illegal DVD's copies and to make the community growth without any illegals.
2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have anegative impact on the ISP?
Answer:
For me many illegals, like downloading music through the internet then after that they will use this to sale it that it's illegal this is not copyrighted, RIAA will do their best to protect the music not using any illegal issues.
Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)
1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.
Answer:
Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online including providing a guide to help you with strategies for keeping your identity private when you blog.
Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them.
LINK REFERENCE:
https://www.eff.org/about
Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.
Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.
LINK REFERENCE:
https://www.eff.org/deeplinks/2012/05/week-internet-censorship-iran-censors-internet-censorship-decree-indian-government
2. What reasons might a firm give for joining and supporting EFF?
Answer:
Helping for a reason they can have also gain more profit because their firm can be exposed to the world of this foundation.
3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?
Answer:
For me, I will give my best to make easier to manage to develop more the telecommunications equipment in the company.
Chapter 5 - Vignette: Sexting
1. Does sexting represent a form of expression that is protected by the First Amendment?
Answer:
Maybe, because we all know that we covered by the law of freedom of expressions this is state in the law.
2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?
Answer:
For me, parents will protect their children's to avoiding any danders of sexting and they will disciplined them in the right ways.