Thursday, May 17, 2012

Chapter 5: Freedom of Expression

Vignette

1. Does sexting represent a form of expression that is protected by the First Amendment?

Yes , 'Sexting' and other teen autopornography are becoming a widespread phenomenon, with perhaps 20% of teenagers admitting to producing nude or semi-nude pictures of themselves and an ever greater proportion, perhaps as many as 50%, having illegally received such pictures from friends and classmates. It is, moreover, beginning to result in criminal prosecutions, andthe statutory penalties are severe. Given the reality of changing social practices, mores and technology utilization, today’s pornography laws are a trap for unwary teens and operate, in effect, to criminalize a large fraction of America’s young people. As such, these laws and prosecutions represent a stark example of the contradictions that can occur when governmental policies and initiatives built on past truths and values collide with new and unanticipated social phenomena. 

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1470819


2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?  

Legal regulation is often the routine, knee-jerk response to
emerging societal concerns. However, imposing harsh, punitive
restrictions on human behavior is not always the answer to these
social problems and often makes matters worse. And so it is with
the phenomena of teenage “sexting.” Technology has once again
outpaced the law, resulting in juveniles being publicly branded as sex offenders for relatively commonplace high school behavior. The
use of stringent child pornography laws to punish children for
activity that was never contemplated by lawmakers is ill-advised
and has the potential to turn a generation of the growing
population against ordered society.
Sexting, a combination of the words “sex” and “texting,” is
the term coined to describe the activity of sending nude, semi-nude,
or sexually explicit depictions in electronic messages, most
commonly through cellular phones.
This disturbing trend has generated some of the most
notorious cases involving juveniles in recent years.
While this behavior is perfectly
legal and accepted among consenting adults, teenagers who
similarly experiment with this communicative outlet are often
dragged into the judicial system by police officers, prosecutors, and
judges. They reflexively categorize the activity as a child
pornography offense and proceed to utilize the strict laws designed
to  protect children as devastating weapons  against them. Often,
juveniles prosecuted for this behavior end up being included on the
public sex offender registry alongside the worst child molesters and
pedophiles

http://www.firstamendment.com/articles/How%20to%20Fix%20the%20Sexting%20Problem%20-%20LGW_UNC%201st%20Amendmen%20Law%20Review.pdf 

The Electronic Frontier Foundation (EEF)

Discussion Questions: 

1. Visit the EEF Web site at www.eff.org and develop a list of its current “hot” issues.  Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position.  Discuss whether you support this position and why.

EFF: Prosecutors want location data via a Twitter shortcut

"The judge also allowed the government to get access to location information without a search warrant. Twitter keeps a record of a user's IP address when he logs in to post a tweet," Hanni Fakhoury, EFF staff attorney, writes. "Since the majority of Twitter users access the site through mobile phones, these IP addresses are keys that help unlock a person's location."

2. What reasons might a firm give for joining and supporting EFF?

The Evergreen Freedom Foundation helps promote a pro-growth agenda in Washington. High growth generally benefits businesses.

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor.  The CFO has asked if you, the CIO, support this action.  What would you say?

I think if I were the CIO, i will accept the donation because it can do a lot of things.




Chapter 6: Intellectual Property

Vignette

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?

The Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies. Its members are the music labels that comprise the most vibrant record industry in the world. RIAA® members create, manufacture and/or distribute approximately 85% of all legitimate recorded music produced and sold in the United States.
In support of this mission, the RIAA works to protect the intellectual property and First Amendment rights of artists and music labels; conduct consumer, industry and technical research; and monitor and review state and federal laws, regulations and policies. The RIAA® also certifies Gold®, Platinum®, Multi-Platinum™ and Diamond sales awards as well as Los Premios De Oro y Platino™, an award celebrating Latin music sales.

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?

I think ISP’s implementation and enforcement of the RIAA’s multitier strategy

could have a negative impact to ISP if they were abusing this too much.


Discussion Questions:

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs.  Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.

For me the different in Excel from Borland is that, all the problems, procedures and formula needed to compute for large quantity of amount can be very easy, because it provides complete instruction for every formula and it is in its quality. I like Excel most especially that I can be able to run an Visual Basic application in Macro. But the only reason why the Borland Excel was being successful, because they just infringing the structure, commands, codes and all those stuffs according to survey, that's the reason they can gather some ideas on how to build same application more quality than the other.

 

2. The courts took several years to reverse their initial decision and rule in favor of Borland.  What impact did this delay have on the software industry?  How might things have been different if Borland had received an initial favorable ruling?

   

In this accident will result into unfavorable court, for allowing Borland product for several years to the public without knowing its infringement.


3. Assume that you are the manager of Borland’s software development.  With the benefit of hindsight, what different decisions would you have made about Quattro? 

 

If ever I will be the manager of the Quattro and i already know that it is illegal, I will directly resign my employment even if I have my big income every month. because from time to time that the company that you were working on will be facing an invistagetion in court you are assuredly obliged to face the court as a managerin your company and aside to face the court you will be put in prison..

 

 

 

 

Chapter 7: Sofeware Development

Vignette

1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?

I think not all software problems holding up the major new product because it is not perfectly done and others have defects on software.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

For me the things to consider to reduce negative consequences is to insure the the person who has a good quality and high performance level of the production to have a good output of business.

 

Patriot Missile Failure

Discussion Questions:

1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life?  Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Seud?  Why or why not?

 Features, ADD-ONs and pricing are the steps to consider i think that this steps might improved the Patriot software

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?

I think the decision made by the U.S military in choosing to deploy the patriot missile to Israel and Saudi Arabia  is to detect the enemies.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

Safety first before everything you want to do because through this you can produce a good output.




Chapter 8: The Impact of Information Technology On Productivity and Quality of Life

Vignette

1. How important is access to ICT in children’s education?

Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners

http://www.ehow.com/about_6612110_importance-ict-primary-education.html#ixzz0q9EwJMp0


2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?

Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculums so all schools produce computer literate, independent learners
eHow.com http://www.ehow.com/about_6612110_importance-ict-primary-education.html#ixzz0q9EwJMp0


Discussion Questions:

1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?

Inequality in economic resources is a natural but not altogether attractive feature of a free society. [ As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness. “At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity.

http://www.weegy.com/?ConversationId=9771CF9C

2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?

Yes health care organization provide to improve services because we all pay our bills to health care.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions?

Drawbacks of telemedicines are that they can be expensive and may or may not be completely covered by every insurer. Demand of telemedicine is pretty high as well. Situations where telemedicine might not be useful might be to the elderly.

http://www.chacha.com/question/what-are-the-drawbacks-of-telemedicine-what-situations-might-not-lend-themselves-to-telemedicine-solutions

 

Wednesday, May 2, 2012

CHAPTER 3 - COMPUTER AND INTERNET CRIME
VIGNETTE


Questions to Consider:



1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?


     My reaction here in the statement of Mr. Gumble is that many of traders now are caught concealing a position that is why we neeed to be matched by careful controls with this , choose the right trader with a good position.
          


2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

     The failure of SocGen's internal control system to detect Kerviel's transaction is that the transactions were entered by an unnamed assistant tarder, thus raising the issue of collusion and indicating even more widespread weaknesses in internal controls.




Discussion Questions
CASE STUDY 3

1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

         Yes , because while he began investigating a flaw in the internet operating system(IOS) used by CISCO routers, he discovered  that it was possible to create a network worm and he decided to speak out and let IT security professionals know about the danger.


2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?

        No, Cisco and ISS must not pull the presentation of Mike Lynn's at the Black hat conference because it is the way to inform the people in the conference about the information that he discovered. We all know that Black Hat stated in the book is the company that provides IT security consulting, briefing and training that is why he wanted to discuss the information about his discovery .
3. Outline a more reasonable approach toward communicating the flaw in the CIsco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved.

      A flaw in its operating software that makes its routers and switches vulnerable to a denial-of-service attack and offered a software fix. Internet Security Systems and Symantec both said they raised their Internet threat levels because of evidence that attackers were exploiting the flaw.link: http://www.crn.com/news/security/18824753/week-in-security-cisco-router-flaw-windows-patch-earnings.htm;jsessionid=cOWol26sRM35ybd5IR52EA**.ecappj01


CHAPTER 4- PRIVACY
VIGNETTE


Questions to Consider:


1. What information about you is being held, who is holding it, and what is this information being used for?


          Breaches of Privacy resulted from simple curiousity snooping the records of a friend, neighbor. These incidents are widespread and involve only a tiny fraction of IRS employees who are disciplined and in some cases prosecuted. Overall, the IRS has handled privacy concerns with great care.


2. What measures are being taken to safeguard this information and what happens if it is inadvertently or deliberately stolen?
      
     For me the safety measures to safeguard this information is to be a good and wise user . Be observant to your environment that there is no one would steal your records .


Discussion Questions
CASE STUDY 3

1. How does Google's business model use personal data?

       Google is firmly committed to the privacy of our advertisers and users. [ While Google does add a cookie to a user's computer when he/she clicks on an ad, this cookie expires in 30 days, and Google does not associate a user's search activity with his/her ad click history. Further, Google does not collect or track personally identifying information, and does not reveal individual information to third parties. Users who do not wish to participate in tracking activities can easily disable Google's conversion tracking cookie in their Internet browser's user preferences settings. These users will not be included in your conversion tracking statistics. ] link: http://www.weegy.com/?ConversationId=F53E8D73

2. What do you think are the major privacy concerns raised by Google's business model and applications?

          I think the major privacy concerns raised by Google's business model and applications is there technology was very open to the public and so others can sneak on it

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
      




"Trust is hard to earn, easy to loose, and nearly impossible to win back.In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis. Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users. Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information. To a certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure. This behavior is unethical because it does not "most dutifully respect the rights of all affected.
link:
http://www.ethicapublishing.com/ethical/3CH15.pdf
















 


Tuesday, April 17, 2012

Chapter 1
Discussion Questions no.3

1. Discuss how a CIO might handle Schrage's scenarios using the suggested process for ethical decision making presented in this chapter.

    In this chapter, CIO might handle Schrage's scenarios using the right thing in developing the customer relation management/CRM system or the right ethical decisions to make the the business developed.They must be critical in choosing the right decision to make sure that they would produced a good system.

2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each Schrage's scenarios.

     Short term losses here fails because clients here are not doing the right thing to their jobs Some readers argued that CIO's must consider the company's long term need than just current needs. Because readers know what kind of solutions they would do to this.
 
3. Must business choose between good ethics and financial benefits? Explain your answer using Schrage's scenarios example.


       For me it is no because ethics is important to earn financial benefits .Good ethics means recommending concepts of right behavior therefore we should combine them instead of separating to maintain the good condition of the business to earn financial benefits.

Chapter 2
Discussion Questions no.3

1. How can organizations and vendors change their certification programs to test for skills as well as core knowledge ? What issues might this introduced?


        Organizations and vendors needs good communication and problem solving skills as well as perseverance to get the job done well and must focus to the skills and knowledge to their related projects. Issues here is all about the learning of the workers that may applied and how to use them wisely.


2. What are the primary arguments against certification and how can certifying bodies change their programs to overcome these shortcomings ?


      Knowledge of IT does not necessarily translate into quality IT work therefore to overcome this shortcomings we must apply our skills specially on training in IT so that we can used it to our works in the near future specially on IT community skills are very important to gain knowledge.

3. What are the benefits of certification ? How might certification programs need to change in the future to better serve the needs of the IT community?


       Employers making good use of certification so that they can easily find jobs and easily determine what kind of employee you are. This certification can be justify that you are attending a training related to IT community.This may also the way that you might be in a good future .

Friday, April 13, 2012

What takes to be an IT Professional ?
           To become an IT Professional , each of us must work hard to improve our skills to make into the highest level. We should do our best to achieve it. We must also concentrate on what we are doing at the right time. To achieve this , we should be knowledgeable in what we are doing. Our attitude also have an impact to the things we have done like doing our programs in the computer.
          Being an IT Professional , we developed here our character to become a Professional . It is not a simple profession but it is a highest level of mans work. We must not called Professional when we don't have a lot of knowledge to master the things in Information Technology. It needs a concentration to your work.\
          Not just on IT ,  important of that is to have a relationship with God so that all the things that have done in your life or work will become successful.