Sunday, May 13, 2012

CHAPTER 10 CASE STUDY


Vignette: Problems with Suppliers
1. How can an organization ensure that all the members of its supply chain will behave ethically?
    Business today is a complicated affair. Markets are extremely competitive, lowering costs and encouraging consumer choice. At the same time,consumers are becoming more informed and, as result, have higher expectations of the behavior of the companies they choose to buy things from. Low prices are attractive, but, for many, they are not enough; consumers expect quality, breadth of range and increasingly are also making their purchasing decisions on the basis of a company’s ethical and environmental track record. The question now for businesses in every industry and of all shapes and sizes is whether it is viable to marry all these demands together into a cohesive and profitable business strategy.The Kingfisher Group, for example, is finding ways to address this issue. As a holding company for the home improvement retailers B&Q in the UK broadcasting in France, Kingfisher’s stance on ethic scan be seen clearly through every one of its products.Whether a door handle or an entire set of garden furniture, each item has been through an often long and complicated supply chain that has had an influence on the environment and human lives at many points along the way. The aim, of course, is tonsure that, where these points of contact are made,the influence is positive rather than negative, but, with so many steps involved in production, this can be hard to evaluate. Kingfisher works to ascertain that the following conditions are met:
• treatment of the people involved in the
production process – that they work in decent
conditions for a living wage, that they are not
exploited and are treated fairly; 
• the environmental consequences of production –
that only sustainable resources are used and that
no excessive pollution is created; and 
• the effects on the local communities – that the
host area is treated with respect and that businesses
obey the local laws and customs and do not
become involved in corrupt practices.

2. What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?
      Organization must check all the suppliers and business partners every month or even every week. They must be wise enough to know ensure that their partners and suppliers behave with a good ethics for the business sake. They must be good in handling them.

Manufacturers Compete on Green Computing
1. How have green computing efforts lowered the total cost of computer ownership?
    IT managers are increasingly seeking out suppliers of high performance, cost-effective and energy-efficient Green IT products. Their primary driver is economic: to reduce skyrocketing data center operational costs, a large proportion of which are energy related costs. As energy costs continue to escalate, users will need to spend significantly more to power and cool their server hardware than to purchase it.
"Earth-friendly" Product Advantages
Supermicro leverages advanced technology and system design expertise to reduce the power consumption of our server, blade, workstation and storage systems. Over many years of experience, we have become an industry leader in power saving technology. In 2006, for example, our 1U Twin™ servers were introduced featuring two DP nodes in a 1U form factor with 89% power efficiency. In 2007 our SuperBlade® systems built on this technology achievement to develop 93% power efficiency. In 2008 Supermicro's DatacenterBlade™ and OfficeBlade™ won Blade System Insight's "Best Green Data Center Solution" award for 93%+ power supply efficiency and our TwinBlade™ won Blade Systems Insight's prestigious "Best Blade-Based Solution" award in 2010 for the highest-performance/density Blade solution with 94%+ power supply efficiency.
Leading the way to even greater results, our engineers continue to improve green technology as a primary product design objective. In 2011, Supermicro introduced a major breakthrough in power supply technology with the industry's first SuperCompact (L220mm x W54.5mm x H40mm ) 1U 400W supply module conforming to Energy Star 2.0 specifications.
Benefits
As a result of these efforts, the Total Cost of Ownership (TCO) of Supermicro's servers and computer systems has decreased significantly over time. Each of our 93%+ efficient systems, comparing to others equipped with traditional 70% to 80% efficient power supplies, can save up to $200 to $500 per year depending on configuration and usage. Alternatively, this savings can provide a reduction of more than half a metric ton of carbon dioxide emissions from the generation of electric power from fossil fuels.
As an example, each node of Supermicro's SuperBlade® can save up to 100 watts over a traditional discrete 1U rack-mount server. These savings add up quickly when a SuperBlade chassis is fully populated with 10 servers. By eliminating the overhead in 1U discrete servers and using high-efficiency (up to 93%) power supplies, the SuperBlade® can save customers between $700 and $1,000 per year in power - even more when lower cooling costs are included. And the carbon dioxide emissions are reduced by more than 5.5 metric tons - the equivalent to planting 1.7 acres of trees.
Link: http://www.supermicro.com/about/greencomputing/

2. Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.
       I will agree to implement programs that change users behavior so that they operate their computers in a more responsible manner. It is the best approach that can yield greater benefits, it is because they can be a responsible user. Implementing programs like this can help them mold to a new person be a good user.

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings.
     As what i have research in the internet, the computer manufacturer currently has the best green computing ratings are Apple.

CHAPTER 9 CASE STUDY


Vignette: Twitter Emerges as News Source for Iran Protesters
1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?
      Now a days people used social networking in different goals about themselves and about the other people. Some used it to destroy and to create chaos to them. Some used it to give and add real value to it.

2. How trustworthy is the information one gleans from social networks such as Twitter?
    Maybe or maybe not. because some social networking not only the twitter give us information, but you don't know how true is.

Social Networking Disaster for Domino’s
1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?
     They must be disappointed of the result. It is the employee who do it and it is their responsibility to disciple all their employee. They must avoid this situation and they must improve their services.
2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?
    It is effective because it seems that people were fun of using technology than reading newspaper.

3. Identify three lessons that other companies could learn from Domino’s experience.
    Never let your employee do their work without your presence.
    Make sure that you employ rules.
    Never trusted your employee.

CHAPTER 8 CASE STUDY


Western Cape Striving to Eliminate the Digital Divide
1. How important is access to ICT in children’s education?
    Information and Communication Technology (ICT) is important in primary education because it enables kids to search for the information they need and to organize what they have found. As children progress through the school system, they become increasingly responsible for their own learning. Many believe that ICT needs to be better integrated into curriculum so all schools produce computer literate, independent learners.
http://www.ehow.com/about_6612110_importance-ict-primary-education.html#ixzz1uSjrMKCR

2. What are the barriers that stand in the way of universal access to ICT for everyone who
wants it?
     The computers and other equipments are more expensive.

Technological Advances Create Digital Divide in Health Care
1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?
      Inequality in economic resources is a natural but not altogether attractive feature of a free society. As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness."At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care (defined as a basic guarantee of health care to all of its citizens). While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity.
http://www.weegy.com/?ConversationId=91CA1D2F

2. Should healthcare organizations make major investments in telemedicine to provide
improved services that only the wealthy can afford?
     They create this for everybody but as what being observed only those who has money used this technology because they are the one who can afford to it, not only for the wealthy or rich people can afford the telemedicine, also for the poor people can benefits so that it’s not fair to others.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to
telemedicine solutions? 
     Telemedicine is a vast subject, but as yet there are limited data on the clinical effectiveness and cost-effectiveness of most telemedicine applications. As a result, objective information about the benefits and drawbacks of telemedicine is limited. This review is therefore based mainly on preliminary results, opinions and predictions. Many potential benefits of telemedicine can be envisaged, including: improved access to information; provision of care not previously deliverable; improved access to services and increasing care delivery; improved professional education; quality control of screening programmes; and reduced health-care costs.

CHAPTER 7 CASE STUDY


Vignette: Boeing Dreamliner Faces a Few Bumps in the Road
1. Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
    For me it is a software problem. They create new software and they introduced it to the public without further study of a possible problem of this software. Time come to them that even their business was affected by this problem. The traveller which is their customer was hassled by the late flight or cancelled flights.

2. What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?
     The best thing that they must do is to improved the software and use other facilities that can improved it. Before they create a new product they must find solution to the existing problem. In order to reduce negative consequence of the software development, insure that the quality is high and good performance.

Patriot Missile Failure
1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?
     To prevent some problems the first steps could have is to double check, during development of the Patriot software is checked carefully to avoid in danger and serious problems. There are many country that uses this missile so there must be a good study.

2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
     The U.S. military made in choosing to deploy the Patriot Missile to Israel and Saudi Arabia because in the desert they have a field area and far in accident.  The system should be well function for them to used it without any hassle and defect. They must also insure the system the has a good calculation of time.

3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?
      The best key lesson here is to how will you developed a high good quality software's in related into the business establishment's.  

CHAPTER 6 CASE STUDY


Vignette: RIAA Fights Music Piracy
1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording
industry?
    I think it helps the music recording industry, so to prevent it’s better to buy an original copies not copyrighted. In support of this mission, the RIAA works to protect the intellectual property and First Amendment rights of artists and music labels, conduct consumer, industry and technical research and monitor and review state and federal laws, regulations and policies. They have the right to stand strong on this law because they felt being insulted. They record that song nor create that movie for them to gain profit but what they did is that they just downloaded it freely on net.

                                      
2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a
negative impact on the ISP?
    The ISP cannot download any movie or music freely. If they want it then they must pay for this. The RIAA says the music industry has fully embraced the Internet as a major channel for distribution to consumers,the group has called on the Federal Communications Commission to endorse efforts to curb illegal downloads of copyrighted works.


Lotus vs. Borland
1. Go to your school’s computer lab or a PC software store and experiment with current
versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief
paragraph summarizing the similarities and differences in the “look and feel” of these two
programs.
    Is a spreadsheet program from Lotus Software (now part of IBM). It was the IBM PC's first "killer application"; its huge popularity in the mid-1980s contributed significantly to the success of the IBM PC in the corporate environment. While the Microsoft Excel is a commercial spreadsheet application written and distributed by Microsoft for Microsoft Windows and Mac OS X. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications.                        
   
                     
2. The courts took several years to reverse their initial decision and rule in favor of Borland.
What impact did this delay have on the software industry? How might things have been
different if Borland had received an initial favorable ruling?
     Its because the Lotus menu command hierarchy is copyright-able subject matter,
we further hold that Borland did not infringe Lotus's copyright by copying it. We need not consider any of Borland's affirmative defenses.  It has a favor decision for Borland. Because they allow Borland without thinking of its consequences and infringement. The industry might be mad and confused for this decision.


3. Assume that you are the manager of Borland’s software development. With the benefit of
hindsight, what different decisions would you have made about Quattro?
     The best thing that I will do is to do the right things and if that right things will be block then I might resign for I know that it is all illegal and someday I might go to prison for this act if I will consider it.

CHAPTER 5 CASE STUDY


Vignette: Sexting
1. Does sexting represent a form of expression that is protected by the First Amendment?
    I guess so, it is because we all know that we covered by the law of freedom of expressions.

2. What can be done to protect people from the dangers of sexting while still safeguarding our
First Amendment rights?
    For the children, the parents should have always to guide their children in a correct way. For people will able to be protected from the danger of sexting is to avoid from texting to those people that are in this action. As we see the cause of this problem is the individual who takes photos of her self nude or even text other people with messages that is not appropriate to them.


The Electronic Frontier Foundation (EFF)
1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research
one EFF issue that interests you, and write a brief paper summarizing EFF’s position.
Discuss whether you support this position and why.

  Bloggers can be journalists (and journalists can be bloggers). We're battling for legal and institutional recognition that if you engage in journalism you're a journalist with all of the attendant rights privileges and protections.
  Bloggers are entitled to free speech. We're working to shield you from frivolous or abusive threats and lawsuits. Internet bullies shouldn't use copyright libel or other claims to chill your legitimate speech.
 Bloggers have the right to political speech. We're working with a number of other public-interest organizations to ensure that the Federal Election Commission (FEC) doesn't gag bloggers' election-related speech. We argue that the FEC should adopt a presumption against the regulation of election-related speech by individuals on the Internet and interpret the existing media exemption to apply to online media outlets that provide news reporting and commentary regarding an election  including blogs.
 Bloggers have the right to stay anonymous. We're continuing our battle to protect and preserve your constitutional right to anonymous speech online including providing a guide to help you with strategies for keeping your identity private when you blog.
 Bloggers have freedom from liability for hosting speech the same way other web hosts do. We're working to strengthen Section 230 liability protections under the Communications Decency Act (CDA) while spreading the word that bloggers are entitled to them.
Source: https://www.eff.org/about

Iran Continues March Towards “Halal Internet”
This past weekend, Iran’s minister of telecommunications announced that domestic institutions including banks, telecom companies, insurance firms, and universities are now prohibited from dealing with emails that do not come from an “.ir” domain name. This means that customers who use foreign email clients such as Gmail, Yahoo!, and Hotmail will have to switch to domestic Iranian accounts, which are subject to Iranian legal jurisdiction.
The foreign email ban is the latest development in what is widely thought to be a transition towards a “Halal” Iranian Internet. The Iranian Telecommunications Ministry has denied “shutting off the Internet” for its residents, but what differentiates this email limitation from previous ones such as the restriction on secure (HTTPS) traffic is its overt nature.
Ustream Adds Russian-Language Option In Response to Crippling DDoS Attack
Livestreaming website Ustream.tv received a massive distributed denial of service (DDoS) attack on the morning of May 9 that reportedly targeted the prominent user “reggamortis1,” a Russian citizen journalist who covers opposition protests and rallies, and is associated with Occupy Moscow. The attack rendered Ustream unavailable for about 10 hours—and the reggamortis1 channel continued to be inaccessible for several hours afterwards.
Brazilian Paper Uses Trademark Law to Silence Parody Website
Falha de São Paulo, a parody website of the major Brazilian newspaper Folha de São Paulo, has been engaged in an ongoing legal struggle with its object of its satire. In September 2010, Folha filed a lawsuit against the Falha website for “moral damages” to its reputation as a news organization. Folha also sought financial compensation for Falha’s mimicry of their layout and copy-editing. This case resulted in a “tie” for both parties: Falha’s domain remained frozen for unauthorized use of Folha’s intellectual property, but the rest of the suit was dropped in accordance with existing Brazilian legal precedent.
Indian Government Demands VoIP Interception Capability In the Next Month
Indian government has ordered Internet service providers to provide a way to intercept and identify the end user on unregistered VoIP calls within the next month. Currently, ISPs do not have to keep track of real-time user data, which, according to the government, exacerbates security risks in a world of proliferating VoIP service providers who use varying connection frequencies.
Ayatollah Ali Khameni Victim of Iran’s Internet Censorship
Iran’s Ayatollah Ali Khameni has become the latest victim of Iran's Internet censorship regime. Indeed, the keywords that Khameni chose for the fatwa announcement last week against anti-filtering tools led to his own decree being blocked along with the Iranian websites where it was published.

 Currently, the Iranian Ministry of Telecommunications is choosing ignore these questions while looking for ways to improve its filtering and censorship systems. Khameni’s announcement has serious press freedom implications for journalists in the country who often need access to blocked websites.

https://www.eff.org/deeplinks/2012/05/week-internet-censorship-iran-censors-internet-censorship-decree-indian-government



2. What reasons might a firm give for joining and supporting EFF?
     Helping for a reason they can have also gain more profit because their firm can be exposed to the world of this foundation. They give and they used the name of this foundation.
   
     History tells that story again and again around the world. As new aspects of society -- and whole new societies -- are built online, the EFF's mission is to protect that liberty.
The payoff, if it succeeds, is tremendous, a huge increase in economic prosperity and an incalculable dividend of personal freedom. Link: http://www.templetons.com/brad/eff.html/
     
                      
3. The vice president of public affairs for your midsized telecommunications equipment
company has suggested that the firm donate $10,000 in equipment and services to EFF and
become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What
would you say?
     I give my very best to support to make easier and easy to manage to improved more the telecommunications equipment in the company.

Monday, April 30, 2012

CHAPTER 4 CASE STUDY


Discussion Questions

1. What type of security breaches of medical record are commonly today?
     There are many types of security breaches, but the most common ones are viruses and worms    that are usually acquired by carelessness of data handling.

2. What measures are being taken by the government and private industry to safeguard EHR's?
     The government has the Health Insurance Portability and Accountability Act (HIPAA), which is an act to protect the confidentiality of the healthcare user and data.

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data?      What breaches do you foresee? How can they be forestalled?
    In my opinion the ARRA has some issues regarding the privacy of the user’s health care and data. The security of the user’s data should always be considered.

Discussion Questions

1. How does Google's business model use personal data?
    I guess the most common here is the Google advertisement.

2. What do you think are the major privacy concerns raised by Google's business model and applications?
     I think the major privacy concern is the personal information of individual personal that uses a Google accounts.

3. Do you think Google has taken adequate measures to protect its user's privacy? Explain your answer.
 
   Google: Trust, Choice, and Privacy
   By: Gus Meuli, Caitlin Finn

“Trust is hard to earn, easy to loose, and nearly impossible to win back.”
This statement seems to ring true in the constantly changing world of business.  In a time where technology is developing faster than ever before, it is very difficult to regulate information privacy. Consumers have chosen to trust many companies with their private information in exchange for services that are used on a daily basis.  Google is in the middle of the debate about information privacy with its internet based services that collect and store enormous amounts of data about its users.  Through a detailed privacy policy, a consumer’s ability to choose between internet services and a trustworthy reputation Google has convinced consumers to use their products despite collecting and storing enormous amounts of personal information.  To certain degree information gathering can be ethical and very useful; however, Google has stepped over the boundary of ethics because of the amount of information they are gathering through their various products and their loose privacy policy that allows for third party exposure.  This behavior is unethical because it does not “most dutifully respect the rights of all affected”

CHAPTER 3 CASE STUDY


QUESTIONS TO CONSIDER

1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble?

 - Trading in different fields is full of opinions about the right way to trade. Trading should abound. If trading is as much about self-development as it is about having a proper profit and loss statement, then as a trader you need to rely more on your individual perspective than on collective opinion. "The rules of conduct are just an outer show of devotion and loyalty - quite confusing to the heart." To be impeccably loyal to a trading system like the issue being said by Peter Gumble, it tells confusing to your heart and your individuality. And when men rely on these rules for guidance, there comes a time of ignorance abounds.
link: http://tradereducatoronline.com/2011/09/20/the-taoist-trader-breaking-the-rules/

2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

 - As I searched over the net...., When the heads of SocGen discovered this, they could not believe this one man had managed to do so much, so surreptitiously. A person familiar with SocGen's board says: " Everyone is stupefied to this affair. SocGen had an image as the best French banking. What is striking here is the contrast between the mediocrity of the trader and the scale of the catastrophe." Jean-Pierre Mustier, the head of SocGen's investment banking division, spent hours interrupting Mr. Kerviel in the aftermath of his Icarus-like plunge that ended up costing the bank €4.9bn.
link: http://www.ft.com/cms/s/0/927fe998-d5b2-11dc-8b56-0000779fd2ac.html#axzz1tgZ0NaYx



Discussion Questions

1. Do you think that Mike Lynn acted in a responsible manner? Why or why not?
    Yes, it is because Mike Lynn wants a pair and square in their jobs.

2. Do you think that Cisco and ISS were right to pull the plug on Lynn's presentation at the Black Hat conference? Why or why not?
    I guess what Cisco and ISS did to Mike Lynn is an unprofessionalism work. Cisco and ISS have to face the issues and problems and be true to the others.

3. Outline a more reasonable approach toward communicating the flaw in the Cisco routers that would have a led to the problem being promptly addressed without stiring up animosity among the parties involved.
    When Mike Lynn discovered that is was possible to create a network worm that could propagate itself as it attacked and took control of routers across the internet.


Monday, April 16, 2012

CHAPTER 2 CASE STUDY

Questions to Consider

1. What message is sent to IT workers by the actions of New York Law School and Colleges even if unrelated job-performance issues justified their actions in firing Gross and Perry?

               Be a professional in doing your jobs and do not makes with  joke actions. sent an email to New York faculty , staff , and students saying I'm saddened to report to you that I learned this afternoon that our colleague, professor Edward Samuel, was arrested on charges relating to possession of childhood pornographic images.and they were fired because of this incident.

2. Since the incident, a number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. Most of the laws state that worker who reports such a discovery is immune from any criminal, civil or administrative liability. Failure to report the discovery can result to a fine, imprisonment or both, do you think such laws will encourage reporting? Why or why not?

            Critics charge that this type of law unfairly transfers law enforcement duties to individuals who may not be qualified to handle evidence or determine what constitutes child pornography. Supporters say reporting mandates for photo labs have proven effective and that similar laws for IT workers will help combat child pornography on the Internet.

Discussion Questions

1. How to distinguish between a gift and a bribe? Provide an example of a "gift" that falls in the gray area between a gift and a bribe.

            Bribe is any inducement given either in appreciation of a past favor or in anticipation of a future one.
            Gift is an item given voluntarily to somebody out of love or compassion, without expecting the recipient to be in a position to reciprocate the gesture later or in future. 

2. Discuss the following topic: law does not provide a complete guide to ethical behavior. An activity can be legal or not ethical.

There are scenarios like that; for Example Company’s has laws but sometimes do not provide a complete guide to ethical behavior. And some companies can be legal but no ethical, because there are legal doings that is against the laws and ethical values, if a company follows the ethical way and law regarding with ethics it is a formal and well processed company.


3. What is a professional malpractice? Can an IT worker ever be sued for professional malpractice? Why or why not?

Yes, IT worker can be sued for his or her professional malpractice, because for me professional malpractice is a failure to exercise an ordinary degree  of professional skills, because for me companies lately chooses a professional IT worker to work for them and well lead them to the top to be the best companies worldwide.


4. Review the PMI member code of ethics in appendix E. for each point in the code, provide an example of a project manager action that would break the code.


5. What must IT professionals do to ensure that the project they lead meet the clients expectations and do not lead the charges of fraud, fraudulent misrepresentation, or breach of contact.


6. Should all IT professionals be either is licensed or certified? Why or why not?

On my own observation both licensed or certified are best for an IT professional because it depends on the skill and also it depends on the professionalism and ethical behavior or the person if he wants to be a licensed such as a licensed programmer or a way that he only wants to be a IT Professional only it depends on the persons' knowledge and skills.


7. What commonalities you find among the IT professionals codes of ethics discussed in this chapter? What differences are there? Do you think there are any important issues not addressed by these codes of ethics?


Discussion Questions
1. This incident illustrates some of the potential problems for small software developers working with giant software manufacturers to extend or enhance their products. Provide two good reasons why small developers should still consider working closely with large software firms?
             To be able to advertise their software and check out the trends in the software business. So that they can gather information because large software firms has the connections.

2. What measures could Limit None have taken to better protect itself from Google's alleged actions? What measures could Google have taken to protect itself from this lawsuit?
            * Limit None, they should have never give the detailed information of their product. They    should have kept the confidential information to avoid copycats.
            * Google, they should have give Limit None shares on their sales or bought the software itself.

3. Do research on the Web to find out how this case is proceeding in the courts. Write a short summary of your findings.  
            A large company like Google will not admit any accusations. I believe that is how they operate. To take advantage of small business firms for their own profits. I think this is a victory for Google.

Discussion Questions
1. What actions should WMI have taken to lessen the risk of this project and avoid these problems?
            At first while there was no signing of contract happened yet, WMI should know better SAP if this company really had an ability to create a mature software. They investigate first to avoid this problem. Now, that the problem exist they must talked with open mind for them to understand each other.

2. What sort of losses has WMI incurred from the delay of this project? How has the lack of success on this project affected SAP?
            They losses enough time to make their work more faster.. Further more there is really no specific or big loss of WMI. Where as SAP, they losses so much trust and their company come to an ease that they are not as  good as other. They will also loss their clients and their jobs.

3. Do research on the Web to find out the current status of the lawsuits between WMI and SAP. Write a brief report summarizing your findings?
            As details of the lawsuit trickled out, it became apparent that the sales people had used a number of well known ‘industry tricks’ to entice Waste Management into buying what they saw as software unfit for their purpose and at a cost of more than $100 million. In this defense, SAP claimed:
Waste Management didn’t “timely and accurately define its business requirements” nor provide “sufficient, knowledgeable, decision-empowered users and managers” to work on the project. In April 2010, we settled the lawsuit, receiving a one-time cash payment, and all parties dismissed their claims with prejudice. So it’s not quite all over but you can be reasonably certain this one has been put to bed. The burning question is how much did SAP fork over? We may never know. SAP did not make an official announcement which would have been required if the amount in question was significant. More important, this is one more piece of SAP’s recent legacy past that it can put to bed in advance of its upcoming annual customer conference which starts May 16th. Much of SAP’s credibility going forward depends on how good a show co-CEO’s Jim Snabe and Bill McDermott put on, how convincing they are and whether the product roadmap looks sufficiently solid for buyers to continue SAP investments. Taking this problem off the table will be a relief and another example of the company clearing the decks

Discussion Questions
1. How can organizations and vendors change their certification programs to test for skills as well as core knowledge? What issues might this introduce?
The organization create a project management certification that give training to the employee and IT workers to gain the certificate needed for the job they are in. It gives chances to them to show not just the core knowledge but also to know how to use the knowledge.

2. What are the primary arguments against certifications, and how can certifying programs need to change in their programs to overcome these shortcomings?
They argued that testable IT knowledge does not necessarily translate into quality IT work. They said that the IT worker needs to have good communication skills and they suspected that the workers paid for their certificate. Later, they decided to build training for them to gain the said certificate and be able to use it in their work.

3. What are the benefits of certifications? How might certification program need to change in the future to better serve the needs of the IT community?
The benefits of these certificates are the employee can easily find a job and they are well recognized as an IT expert through this certificate. This certificate might be use to have a best IT workers and to create a best IT community.



Discussion Questions
1. What actions should WMI have taken to lessen the risk of this project and avoid these problems?
            At first while there was no signing of contract happened yet, WMI should know better SAP if this company really had an ability to create a mature software. They investigate first to avoid this problem. Now, that the problem exist they must talked with open mind for them to understand each other.

2. What sort of losses has WMI incurred from the delay of this project? How has the lack of success on this project affected SAP?
            They losses enough time to make their work more faster.. Further more there is really no specific or big loss of WMI. Where as SAP, they losses so much trust and their company come to an ease that they are not as  good as other. They will also loss their clients and their jobs.


3. Do research on the Web to find out the current status of the lawsuits between WMI and SAP. Write a brief report summarizing your findings?
            As details of the lawsuit trickled out, it became apparent that the sales people had used a number of well known ‘industry tricks’ to entice Waste Management into buying what they saw as software unfit for their purpose and at a cost of more than $100 million. In this defense, SAP claimed :
Waste Management didn’t “timely and accurately define its business requirements” nor provide “sufficient, knowledgeable, decision-empowered users and managers” to work on the project.
In April 2010, we settled the lawsuit, receiving a one-time cash payment, and all parties dismissed their claims with prejudice.
So it’s not quite all over but you can be reasonably certain this one has been put to bed. The burning question is how much did SAP fork over? We may never know. SAP did not make an official announcement which would have been required if the amount in question was significant. More important, this is one more piece of SAP’s recent legacy past that it can put to bed in advance of its upcoming annual customer conference which starts May 16th.
Much of SAP’s credibility going forward depends on how good a show co-CEO’s Jim Snabe and Bill McDermott put on, how convincing they are and whether the product roadmap looks sufficiently solid for buyers to continue SAP investments. Taking this problem off the table will be a relief and another example of the company clearing the decks


Discussion Questions


1. How can organizations and vendors change their certification programs to test for skills as well as core knowledge? What issues might this introduce?
             The organization create a project management certification that give training to the employee and IT workers to gain the certificate needed for the job they are in. It gives chances to them to show not just the core knowledge but also to know how to use the knowledge.


2. What are the primary arguments against certifications, and how can certifying programs need to change in their programs to overcome these shortcomings?
                  They argued that testable IT knowledge does not necessarily translate into quality IT work. They said that the IT worker needs to have a good communication skills and they suspected that the workers paid for their certificate. Later, they decided to built a training for them to gain the said certificate and be able to use it in their work.


3. What are the benefits of certifications? How might certification program need to change in the future to better serve the needs of the IT community?
                     The benefits of this certificates are the employee can easily find a job and they are well recognized as an IT expert through this certificate. This certificate might be use to have a best IT workers and to create a best IT community.

CHAPTER 1 CASE STUDY


Questions to Consider
1. Which issue is more disconcerting- the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? defend your position.
The more disconcerting issue is the fact that a board member leaked confidential information because it's against the company regulations, even though they leak information the three hired detectives can easily trace the board member through their telephone records and social security numbers. 

2. Can the use of pretexting to gain information ever be justified? is it consider legal under any circumstances.
              Pretexting to gain information in a situation based on the vignette it is totally illegal because it is not your part to gain or collect information for the company you have to stick for the kind of task assigned to you to to pretext and do other things without permission.



Discussion Questions

1. There are many ethical issues about which people hold very strong opinions-abortions, gun control and the death penalty, to name a few. if you were a team member on a project with someone whom you knew held an opinion different from yours on one of these issues, would it affect your ability to work with this person? why or why not?
              As a member of a team and given a project to those issues shown, it would not affect my ability to work effectively because as a member of a team we have to gather opinions and share ideas for each member of the team so that we'll accomplish it clearly without anguishing someone's opinion.

2. What do you think are the most important factors that helped you define your own personal code of ethics.
             Important factors that helped me define my personal code of ethics are leadership and decision making,leadership you have to manage yourself on what you do and lead yourself,decision making because you have to decide what's right or wrong when making decisions on social works and core values.

3. Do you think that ethics in business is improving or getting worse ? defend your position.
             On my observations, ethics in business is improving because business are important when it terms to ethics example of it is the terms and conditions of the business people cannot abide the company regulation it is very helpful because it helps to company to be more discipline and always on top.

4. The ethics resource center identified five characteristics of a successful ethics program suggest a sixth characteristic, and  defend your choice.
            Organizations contact millions of people worldwide through unsolicited e-mails as an extremely low-cost marketing approach.

5. Which incident has a higher negative impact on an organization-an unethical act performed by an hourly worker or the same act performed by a senior manager of the organization? explain your answer fully. should the hourly worker be treated differently than the senior manager who committed the unethical act? why or why not?
              On my own opinion both unethical incident has both a higher impact on an organization, because for me even though they are not on the same position they both commit an unethical mistakes and it is against ethics. they both deserve to be treated fairly because they are the same worker of an organization.

6. It is a common and acceptable practice for managers to hold people accountable to meet "stretch" goals, quotas, and budgets.how can this be done in a way that does not encourage unethical behavior on the part of employees.
             My observations some companies required this accountable for enable for them to compute the salaries of the employees based on the work done. for me the company or organization should explain clearly or to orient the employee's of their company or organization on how do they hold people's accountable to meet stretch.

7. Is every action that is legal also ethical? can you describe an action that is legal but ethically wrong? is every ethical action also legal? is the law, not ethics, the only guide that business managers need to consider? explain.
             No, because there are sometimes an unethical part on every legal actions. sample of a legal but ethically wrong is you working on a private company and you are a programmer, your created programs are signed by the company and must be within the company only and that is legal. the ethically wrong doing is sharing your company s' programs to other company and that us against ethics and it is illegal. they both have to consider the law and ethics because for example company has laws, and ethics is barely needed to determine if the law is against ethics.

8. Do you think it is easier to establish an ethical work environment in a nonprofit organization? why or why not?
             On my own opinion it depends on the worker of the company/organization if he or she accepts to a nonprofit organization as long as the worker establish the law of ethics or following the rules of ethics on the organization, it helps the work environment to be more confident on their work because they know the limitations and what is best for the company even though it is a  nonprofit organization.

9. This chapter discusses the four approaches to dealing with moral issues. identify and briefly summarize each one. do you believe one perspective is better then others? if so, which one and why?
     Most of us have developed a simple decisions-making model that  includes these steps:
* developed a problem statement
* identify alternatives
* evaluate and choose an alternative
* implement the decisions
* evaluate the results

Discussion Questions

1. CA executives involved the accounting scandal were not accused of reporting bogus contracts or hiding major problems in business. the contracts that were backdated were real sales agreements. was this really a crime? should the individuals have been punished so harshly? 
              I think this is not a crime this is a business. There's no one to be punished. 

2. In December 2004, CA appointed Patrick J. Gnazzo as a senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically, Gnazzo served in this role at United Technologies for 10 years and had been a member of the board directors of the ethics Offices Association .Gnazzo reported to a  new executive vice president and a general counsel at CA as well as the board's Compliance committee. Outline some of the Actions Gnazzo might have been taken in his first six months on the job.
3. John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and President his first few months with the firm were rough- major customers threatened to dumb the firm some products were behind schedule and were of poor quality; executives had to be fired for breaking company  rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. what sort leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?

4. CA has been hit with numerous scandals since the late 1990's. these scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on this distractions. compare the revenue growth and stock price of CA to that of some of its competitors over the period 2004-2008 (be sure to use CA's corrected figures!) can you detect any impact of these scandals on CA's performance? what else might explain the difference in performance?


Discussion Question

1. Identify at least two other companies that mange their suppliers in a manner similar to Dell computers. do these companies have anything in common with Dell?
                           ASUS is a leading company driven by innovation and commitment to quality for products that include notebooks, net books, laptops, motherboards, graphics cards and etc.
               Acer Incorporated is a multinational information technology and electronics corporation headquartered in Xizhi, New Taipei City, Taiwan. Acer’s products include desktop and laptop PCs, tablet computers, servers, storage devices, displays, smartphone and peripherals. It also provides e-business services to businesses, governments and consumers.

2. Can you Identify any disadvantages for dell in taking the approach to managing suppliers?
                        One of the disadvantages is their payment system, and the way they pressure their suppliers.But I understand Dell why they pressure their suppliers for it is business you will not get the success if you are lazy (late deliveries). But they were so unfair to the suppliers in terms of deliveries they pressure their suppliers but in terms of payment to their suppliers they do not pressure their selves. But it is Dell Company it is a big company for them replacing new suppliers is very easy, because they were very confident.

3. Do you think that this approach  to managing suppliers is unethical, or is it acceptable and ethical? explain your reasoning.
                           For me it is ethical or acceptable even though they were strict to their suppliers. That’s business, off course Dell don’t want to destroy their reputation because of the late deliveries to their customers.

4. Would you recommend any changes to the way Dell manages suppliers? Defend your position.
                           I understand Dell why they paid their suppliers so late for there are lots of things that need to be process. But 36 days is too long it takes 1 month before they can receive their salary. The suppliers also have their families that need to be supported financially. And also one thing I recommend to Dell they should be humble to their suppliers. Because the suppliers were one of the reason why their sales get higher and higher in short, the Dell Company only depend their products into their suppliers.       

Discussion Question

1. Discuss how a CIO might handle Schrage's Scenarios using the suggested process for ethical decision making presented in this chapter.
              The CIO must handle schrage's scenarios by showing or orienting them the right process of making a tough decision in a formal and ethical way, because if process are not followed formally, making their own decisions are not well good enough to meet the standards.

2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage's scenarios.
              My own understanding short term losses fails to meet standard for their businesses the might loose something but a small amount or quantity, as a example their client might be disappointed on their jobs or projects because they are not doing it a right and formal way and ethical process are not formally followed, while if process is formally followed companies gains a lot when they are doing it in a right and ethical ways.

3. Must businesses choose between good ethics and financial benefits? explain your answer using Schrage's scenarios as example.
             No, because if you gain a lot on your company or business in a way that is not ethical and it might be illegal or against the law of ethics, they can benefit something but it is not the right process of gaining financial benefits. ethics is more important because i believe if a company has ethics it financially benefits a lot.

Thursday, April 12, 2012

What takes to be an IT Professional?

        Generation nowadays always involves automation machines and the world renoved world wide web (www). Most of the countries around the globe introduces IT knowledge to their universities and schools and to the corporate world. Most of the companies nowadays implement IT departments so that their company will have a better system for them to be more organized.

         Being and IT Professional is not an easy thing to do. You have to be responsible on doing your task and always update every work you already have done. Being and IT Professional is not all about you are good in computers, but you also have a good manners, attitudes and values in life. you know what is right and wrong principles in doing things. Become an IT professional is to learn to manage your work and time. A great way of managing your work and time is to make lists of everything you need to do. If you know what you need to do, and have it written down, you can work out what your priorities are and how long it can take you to get things done.