Saturday, 12 May 2012


Chapter 10 - Case Study 3: Manufacturers Compete on Green Computing


1. How have green computing efforts lowered the total cost of computer ownership?


Answer:


For me, It will help reduced the power consumption of every computer and it is friendly to use.




2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

Answer:


For me i think both, it's because they will help the world to monitor if they have any bad behaviors has been done.


3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.

Answer:


EPEAT™ is an environmental standard and rating system that makes it easier for computer purchasers to buy high performance notebooks, desktops and monitors that meet stringent environmental criteria developed through a stakeholder consensus process supported by the U.S. EPA ENERGY STAR® programme.

LINK REFERENCE:

http://shop.lenovo.com/ISS_Static/WW/EMEA/merchandising/sitelets/Lenovo-Green/en/Green-White_paper_ONLINE.pdf


Chapter 10 - Vignette: Problems with Suppliers

1. How can an organization ensure that all the members of its supply chain will behave ethically?


Answer:

For me the better results, communicate to assure that all of the employee such as the buyers or the managers need to train to ensure all of the policy to make the staff know the exact and to manage the supply chain.



2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?


Answer:

In the business their are suppliers and the customer. Suppliers they will create good relation to the customers to make a good deal, because if we able have a good relation to the customer they will help you to your supplier able to create more responsive chain related to the matter.




Chapter 9 - Case Study 3: Social Networking Disaster for Domino’s


1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?

Answer:

Domino’s were not so updated with regards to the social media. They just found out with someone commented on their blog. Then damage is going on. And customers are alarm that they view that video the customers are not to eat in pizza at Domino's in that case you will apologize.




2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

Answer:


Yes, for me it is powerful if you make any damage in online media to make necessary apology and if they will do that for me they will possibilities to bring back the damage that have done. 




3. Identify three lessons that other companies could learn from Domino’s experience.

Answer:


For me, first thing to do make update to  your surroundings and if they have find any problem you will action on it avoiding any problems and to be honest in your co-workers.





Chapter 9 - Vignette: Twitter Emerges as News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

Answer:


For me the Internet makes it difficult to determine identity and intentions, which makes investigations of trust particularly important in the online space. Because online communication is frequently anonymous, asynchronous, and different-place, the risks to deception being caught are few, and deceptive behavior online is considered to be more common than offline.






2. How trustworthy is the information one gleans from social networks such as Twitter?

Answer:


For this twitter a social networking site if any issues seen in the twitter they will post any words that can irritate a person they make it expand many people will against on you this site is not good for me.





Chapter 8 - Case Study 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

Answer:

Health care is a service that we all need, but just like food and shelter it is best provided through voluntary and mutually beneficial market exchanges. A careful reading of both the Declaration of Independence and the Constitution will not reveal any intrinsic right to health care, food or shelter. That's because there isn't any. This 'right' has never existed in America.




2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?

Answer:


Yes, for me they will make investments regards in service, because if they will make some improvements in telemedicine there services will grow and this will be serve as a good thing to do to make other people satisfied in their services.



3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine  solutions?

Answer:

Its easy part of those patients who monitor their health situation it’s somehow applicable to decrease their annual patient cost but for those people who can’t afford telemedicine might have gap to their healthcare.



Chapter 8 - Vignette: Western Cape Striving to Eliminate the Digital Divide


1. How important is access to ICT in children’s education?

Answer:


According to ICT adviser Harriet Price it is no longer simply a case of thinking in terms of the benefits that an ICT-rich educational experience brings to children. She insists that technology is now such an important part of children’s everyday lives that a learning environment without it would be completely out of touch with their own realities.
A former primary school ICT coordinator, Harriet now works in Cambridgeshire as an ICT adviser. Two of the early years settings she supports, Histon and Homerton children’s centres have recently received the prestigious ICT accreditation mark from Becta – the British Educational Communications and Technology Agency.
LINK REFERENCE:


http://www.teachingexpertise.com/articles/the-benefits-of-introducing-young-children-to-ict-3072

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it

Answer:


To make the children learn more and give knowledge and they will develop their skills and also they will learn more they will find ways to progress their learnings.  





Chapter 7 - Case Study 3: Patriot Missile Failure


1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

Answer:


They use this to have testing of their missile to be as standard to compare other top missiles and to make sure that this is they like to use against the Scud.  



2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

Answer:


For me, the U.S military their are good in wars; but avoiding the missiles they will do their best to deploying the missiles that can use in war able to protect and to prevent killing another U.S army that's why they will deploying the missiles.



3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

Answer:


For me, safety-critical software will be tested it's because able to know if has a problem on it it will be review and to evaluate each software then must be able to examine it to make sure there are know such problem if they will release the software.




Chapter 7 - Vignette: Boeing Dreamliner Faces a Few Bumps in the Road


1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

Answer:

For me, Yes, because this is helping to develop a software and also to evaluate the products then if we work on this the problems will not affect to the customers.




2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
Answer:


You will examine all of your product to make sure that their are function well may cause a good quality on it also to review all of the data to make the products in a good condition after that you must secure all of your products to avoiding necessary problems.




Chapter 6 - Case Study 3: Lotus v. Borland




1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.

Answer:

As what as I observe there’s a lot of similarities including the functionality are the same. The interface of Excel and Lotus are almost the same the function of the input type in keyboard and mouse are the same. But on the insert bar of lotus are different compare to excel which is intact and lot of functions found on Menu bar to be use. But overall most of them have similarities.

2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?


Answer:


For me, the borland prducts are affect on it, it's because the sales will be loss this issue it can affect to the industry the supplier and the consumer as well in that case the developers will protect their product able to avoid such issues and to protect the business.


3. Assume that you are the manager of Borland’s software development. With the benefit ofhindsight, what different decisions would you have made about Quattro?


Answer:

For me, i will make sure that it is unique and to also to use other company, because if we sell our product to the other company we can find a better and much useful software.




Chapter 6 - Vignette: RIAA Fights Music Piracy



1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?

Answer:


The RIAA is helpful, it's because they will protect all of the original copies such as DVD's and CD's to prevent any illegal DVD's copies and to make the community growth without any illegals.




2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have anegative impact on the ISP?


Answer:


For me many illegals, like downloading music through the internet then after that they will use this to sale it that it's illegal this is not copyrighted, RIAA will do their best to protect the music not using any illegal issues. 




Chapter 5 - Case Study 3: The Electronic Frontier Foundation (EFF)


1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.

Answer: 


Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online including providing a guide to help you with strategies for keeping your identity private when you blog.
Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them.



LINK REFERENCE:

https://www.eff.org/about

Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.

LINK REFERENCE:

https://www.eff.org/deeplinks/2012/05/week-internet-censorship-iran-censors-internet-censorship-decree-indian-government




2. What reasons might a firm give for joining and supporting EFF?

Answer:


Helping for a reason they can have also gain more profit because their firm can be exposed to the world of this foundation.



3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?

Answer:

For me, I will give my best to make easier to manage to develop more the telecommunications equipment in the company.







Chapter 5 - Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?

Answer: 


Maybe, because we all know that we covered by the law of freedom of expressions this is state in the law.


2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?

Answer:


For me, parents will protect their children's to avoiding any danders of sexting and they will disciplined them in the right ways.


Tuesday, 1 May 2012

Chapter 4 case study

HOW SECURE IS OUR HEALTHCARE DATA?

Discussion Questions:


1. What type of security breaches of medical record are commonly today?


Answer:


We have many types of security breaches, but the most common in are viruses and worms they are viruses that usually appear in the computers or any networks. 

2. What measures are being taken by the government and private industry to safeguard EHR's?


Answer:


The government has the Health Insurance Portability and Accountability Act (HIPAA), which is an important to protect the privacy of the healthcare and informations or data.

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data? What breaches do you foresee? How can they be forestalled?

Answer:

For me,  the ARRA has some issues regarding the privacy specially in the health care and data. The security of the data should always be protected all the files inside.


Discussion Questions:


1. How does Google's business model use personal data?



Answer:


For me the main purpose in Google the advertisement of their business.



2. What do you think are the major privacy concerns raised by Google's business model and applications?


Answer:


For me the privacy concern in the Google is the personal informations using in the accounts.



3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.


Answer:


“Trust is hard to earn, easy to loose, and nearly impossible to win back.”
This statement seems to ring true in the constantly changing world of business. In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis. Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users. Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information. To certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure. This behavior is unethical because it does not “most dutifully respect the rights of all affected”
Chapter 3 case study 


COMPUTER AND INTERNET CRIME


QUESTIONS TO CONSIDER


1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

Answer:

Trading in different fields is full of opinions about the right way to trade. Trading should abound. If trading is as much about self-development as it is about having a proper profit and loss statement, then as a trader you need to rely more on your individual perspective than on collective opinion. "The rules of conduct are just an outer show of devotion and loyalty - quite confusing to the heart." To be impeccably loyal to a trading system like the issue being said by Peter Gumble, it tells confusing to your heart and your individuality. And when men rely on these rules for guidance, there comes a time of ignorance abounds.


Reference:

link: http://tradereducatoronline.com/2011/09/20/the-taoist-trader-breaking-the-rules/


2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

Answer:

As I searched over the net. When the heads of SocGen discovered this, they could not believe this one man had managed to do so much, so surreptitiously. A person familiar with SocGen's board says: " Everyone is stupefied to this affair. SocGen had an image as the best French banking. What is striking here is the contrast between the mediocrity of the trader and the scale of the catastrophe." Jean-Pierre Mustier, the head of SocGen's investment banking division, spent hours interrupting Mr. Kerviel in the aftermath of his Icarus-like plunge that ended up costing the bank €4.9bn.

Reference:

link: http://www.ft.com/cms/s/0/927fe998-d5b2-11dc-8b56-0000779fd2ac.html#axzz1tgZ0NaYx


Discussion Questions


1. Identify and briefly discuss four reasons why computer incidents have become more prevalent.


Answer: 
               
Computers are having a incidents it's because they not using any security to protect the computers able to enter the computer easily and to delete all the files inside the computer or it will put a virus on it able to damage the software.


2. A successful distributed denial-of-service attack requires downloading software that turns 
unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be fined as a means of encouraging people to better safeguard their computers? Why or Why not?


Answer:


For me the owner will protect their programs to avoiding malicious hacker. Because the hackers will do their work to hack any sites or program that their like to avoiding that it's better to make protection to prevent any malicious hackers in any programs or sites.


3. Do you believe that spam is actually harmful? Why or why not?


Answer:


For me it's harmful, because spam is abusing an email system example if know one are sending an email for you but their are sending a message if you open that it can harm your computer we don't know if that message having also a virus that can damage your system we must be careful on it.


4. How ca installation of a firewall give an organization a false sense of security?


Answer:


For me installation of a firewall cam secure your business or any organizations would to access any networks. Because they are using firewalls to secure their networks. Example if any organizations would like to access i the network if that organization not identify of the network they will use the firewall to blocked or not gaining access on the network.


5. Some IT security personnel believe that their organizations should always employ whatever resources are necessary to capture and prosecute criminals. Do you agree? Why or why not?


Answer:


I  agree, because if the IT security do that they can capture any criminals that having a bad intention through the computers it can help also avoiding any malicious or bad intentions of any organizations.


Discussion Questions


1. There are some who think that the techniques tools used in the Dark Web project could be used in a way that could negatively affect our way of life. The executive director of the Electronic Privacy Information Center, Marc Rotenberg fear "the very same tools that can used to track terrorist can also be used to track political opponents. " What are some negative ways such tools can be used against U.S citizens? Do you think that this is reasonable fear?


Answer:


For me this dark web project can tracking any terrorist able to know if what are they doing if we know the terrorist are having planned we will know their planned we can intercept their communications in other terrorist to avoiding a bad intentions as well.


2. Identify three positive ways that this technology could be used to improve the performance      organizations or to help us i our daily lives.


Answer:


For me the positive ways that any technology used to improve their performance in organizations. To help them to make easier of their work using technology to communicate of their business having conversations using technology and helping them to make fast of their transactions.


3. Do a Web search to find current information about the dark web research being carried out UA, including information about the budget for this effort, the number of researchers current employed, and any new tool or techniques they've developed. Write a brief summary of your findings.


Answer:


For me findings a information of the dark web to know that they having effort to make such new tools or techniques to developed any devices or technology we can avoid all of these getting their own informations. 


Discussion Questions


1. What harm does a worm cause to the public, Internet service providers, and e-mail service providers? Are there other reasons why many people object so strongly to the spread of worms?


Answer:


For me, Worms is a virus it is a harmful virus that can damage programs or systems in the computer they use this virus to sending copies of others if you open it the worm virus spread their are possibilities you will lost all of your data, programs other files that this virus can destroy.


2. What would you say or do if you received an email that guaranteed you $20 per month if you agreed to permit your computer to be used to send email during hours you are not using it?


Answer:


For me if that is their strategy to get the attention of it i will avoid that it's because you have nothing agreed something that they will give $20 per month you will not get their plan to do such bad intentions of sending an emails.


3. Do you feel it is objectionable to let others use your computer to execute your files without your prior knowledge or consent? What if ti were for a good cause, such as destroying a worldwide botnet, such as that created by the Storm worm, or running an application that analyze research data related to finding a cure for cancer?


Answer:


For me if you let others use your computer execute files without your consent your files will terminated you let others use your computer we don't know if that person has bad intention to do that or putting any kind of virus that can harm your computer. You will avoid that to secure your all files in the computer.


Discussion Questions


1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?


Answer:


For me  yes, because Mike Lynn do his job and remind all of them what is the possibilities that can cause damage of a property he is concern if what can do if that will happen he do his best for what is right for their country. 


2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?


Answer:

Cisco and ISS treated Mike Lynn is an unprofessionalism work. Cisco and ISS they have to face the problems regarding of their issues.


3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.


Answer:


Mike Lynn discovered something that can create a worm in the network to attack and control all of the routers in the internet.