Sunday, March 1, 2015

Chapter 6 and 7 Case Study


Chapter 6 – Intellectual Property

    1. You have procrastinated too long and now your final paper for your junior  English course is due in just five days – right in the middle of final exam week! The paper counts for half your grade for the term and would probably take you at least 20 hours to research and write. Your roommate, an English major with a 3.8 GPA, has suggested two options (1) He will write an original paper for you for $ 100, or (2) he will show you two of three “paper mills” Web sites, from which you can download a paper for less than $35. You want to do the right thing, but writing the paper will take away from the time you have available to study for your final exam in three other courses. What would you do?
  • ·         I will do the right thing in making my own paper. The grade will be based on my work, so it is a pleasure if you get a grade that you know you are working it hard and you deserve it. I need to manage my time in doing my paper. Maybe I will get some idea from the resources that I can trust, so that it is easy for me to finish it. Because if you are the one who made it, when the instructor ask about the paper, you know what is the answer and you are confident that you can answer all the question because you know what is inside the paper you made it by yourself.

2  2. You are beginning to feel very uncomfortable in your new position as a computer hardware salesperson for a firm that is the major competitor of your previous employer. Today for the second time, someone has mentioned to you how valuable it would be to know what the marketing and new product development plans were of your ex-employer. You stated that you are unable to discuss such information under the nondisclosure contract signed with your former employer, but you know your response did not satisfy your new coworkers. You fear that the pressure to reveal information about the plans of your former company is only going to increase over the next few weeks. What do you do?
  • ·         I know what my rule as an employee is. If I came from other company, and working to the new one and they ask me about my old company trade secret, I will not tell them. It the reputation of my old company. Their success is their trade secret and they are working it hard to achieve it. I don’t want that I will be the one to destroy it. I left there company with a clean name and I will maintain it. If my new company will not respect my decision, it means that I can’t trust them. They want their company to be successful right away without working it hard to achieve it, by stealing my former employer trade secrets. They don’t know what ethics is, so there is no reason continue  working with them.

     3.  You have been asked to lead your company’s new competitive, intelligence organization. What would you do to ensure that members of the new organization obey applicable law and the company’s own ethical policies?
  • ·         If I am given a chance to lead one organization, it is an honor to me. To be able that my members obey any rules and ethical policies, it should start on me. I will show them what is in good being ethical person.  They chose me to lead one organization because they saw something that I am capable on handling one organization. As what I had told you that being a leader, it should start to yourself to be good in everything so that your members will be able to follow you or be a model to them.

      4. You are the vice president for software development at a small, private firm. Sales of your firm’s products have been strong, but you recently detected a patent infringement by one of your larger competitors. Your in-house legal staff has identified three options: 1) ignore the infringement out of fear that your larger competitor will file numerous countersuits: (2) threaten to file suit, but try to negotiate an out-of-court settlement for an amount of money.
  • ·         Being the vice president, it is in my hand the success of my firm. I will do whatever it takes to fight what is right and belongs to my firm. I will not ignore the other competitor, we are the one first on that idea, that is the key to our success, so I don’t want that someone will take that away from us. I don’t care I file suit for them I will fight for the truth.


Chapter 7- Software Development

1.  Should Apple conduct extensive screening of Apps before they are allowed to be sold to the App Sore?
    Why or why not?
  • ·         Yes, so that the Apple will know if one’s application is not harmful to the users. If one app also passed on their review process or application quality standards.
·          
2.   Do research to determine the current status of the FTC investigation of Apple for banning the use of the Adobe Flash     
     software on devices that use the iOS operating system?
  • ·         Yes.

3.  What do you think of Apple’s guideline that says it will reject an app for any content or behavior that they believe is over the line? Could such a statement be constructed as a violation of the developer’s freedom of speech? Why or why not?
  • ·         No, that statement will be a violation to the developers. They can’t judge something when they didn’t see what is the effect or impact  on that app to the users. Don’t say right away  it is rejected unless you see it!



Chapter 4 and 5 Case Study


Chapter 4- Privacy
1.      As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products store in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then display information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator move and he plans to use this data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?
  • ·         Of course, we need to be more careful and responsible for whatever the equipment or system we have in our company. Because this system or equipment will be a great help in your company, so it will be easy to determine the processes. And whoever in-charge on the machine he has to know or has a knowledge on how to operate to avoid malfunctioning.  If there is a problem, you should report it right away to the management so that it will be fixed and the transaction will be continuous. If it is not, maybe it will cause a big problem.

2.      You have been asked to help develop a company policy on what should be done in the event on a data breach, such as unauthorized access to your firm’s customer database which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?
  • We all know that data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. But as an employee to the company you should respect or follow their policy, especially the trade secrets of the company. Educate employees about appropriate handling and protection of sensitive data. The continuing saga of lost and stolen laptops containing critical information illustrates that corporate policy designed to safeguard portable data only works when employees follow the rules. .Look beyond IT security when assessing your company's data breach risk. Establish a comprehensive breach preparedness plan that will enable decisive action and prevent operational paralysis when a data breach occurs. Your efforts will demonstrate to consumers and regulators that your organization has taken anticipatory steps to address data security threats. Disseminate this plan throughout the management structure to ensure everyone knows what to do in the event of a breach.

3.      You are new manager for a product line of Coach Purses. You are considering purchasing customer data from a company that sells a large variety of women’s products online. In addition to providing a list of names, mailing addresses, and email addresses, the data includes an approximate estimate of customer’s annual income based on the zip code in which they live, census data, and highest level of education achieved. You could use the estimate of annual income to identify likely purchases of your high-end purses and use email addresses to send emails announcing the new product line and routing its many features. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion in this instance? Why or why not?
  •     Having their personal information it is easy for you to determine who your valued customers are. It is easy for you to promote your products through online. You are able to identify who will be the person can afford to your upcoming products based on their salary, because you have a record of it. But don’t look only on the salary basis. Be fair to all your customers, whether they have a big or small salary. It’s up to you how you will handle or promote your products. If you have a good relationship to your customers, they will trust and always rely on your products. For example, you have a new product that is in good quality and expensive, so that means you will look only or promote that product to those has a big amount of income only? No, you shouldn’t do that. Be fair, promote that product to all your customers whether they can afford it or not, at least they will know.

4.      Your company is rolling out a training program to ensure that everyone is familiar with the company’s IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with anticipated resistance to policy?
  • ·         As a member of Human Resource department, we are in-charge to insure that every employee is familiar to IT usage. But we will expect that not everyone is agree on that. We will explain to them that this training is a great help to their self-esteem and confidence. I will listen to them, let them explain what is in their mind, and after that I will explain it to them until they will realize that it is a good idea to attend the training. It doesn’t mean that if you are assigned to the job that you are not using a computer, you don’t need to know how to use the computer. They will think that they don’t need it anymore. It is hard for them to learn.  That is why we are conducting this, to help them to be flexible, maybe we don’t know in the future they might need this. The training will not harm them, this can help them.


Chapter 5- Freedom of Expression

     1. A former high school classmates of yours who has returned to China emails you that he has been offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?
  • ·         That is a good news and I am very proud of my friend. Not everyone will be given a chance to work with them. Only the chosen one and the talented. He showed them that he is good on that field. Maybe the Chinese saw and realized that he will be a great help and be trusted to work with them. It will be a great pleasure to be his friend and it brings honor to our country.
        2.  Your 15-year-old nephew exclaims “Oh wow!” and proceeds to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
  • ·         I know that my nephew is in the stage of puberty. I will explain to him that what he wants to happen is not good.
The reputation of our family and his girlfriend will be in crisis. If the school will know it, he will be in trouble, maybe they will be suspended both. They’re both parents will be called by the Principal and everyone will be talking about them. I will tell him and explain to him to understand that what they are doing is not good. If it’s continue,  it bring a bad effect to both of them. They should stop on what they are doing. And enjoy life without doing such inappropriate behavior.

        3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting. Should that fail, the PR firm will generate dozens of positive postings to outweigh the negative posting. What would you say to your friend about her idea?
  • ·         I will tell her that her idea is genius. I will support whatever her plan is. But before that we need to study everything related to our plan. It is not easy to open a firm without a knowledge about it. Her idea is great to prevent and avoid people from spamming and any other unethical behavior they are planning to do. This will help to the safety and privacy of innocent users.

       4. You are the computer technical resource for country’s public library system. The library is making plans to install Internet filtering software so that it will conform to the Children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of Internet filters? How might you deal with such objections?
·         The library’s plan is great and brings protection to the minors. This plan will give protection to the children. Only the websites that is not appropriate to the children will be filtered that is not suitable for the children. It is inside the library, the library will be the source of information and knowledge to the children. It will cater only to the websites that is educational. But before we implement this plan, we have to ask permission from the community. We will accept whatever their suggestions. When the community will understand what our goal is, there will be no problem to implement it.
  
            5.   Imagine that you receive a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
  • ·         If ever I receive a hate email, I will handle it in the right way. I need to know first why someone sends me a hate email. What did I do? Did I hurt someone?  If I can handle it by myself, no one will know it. If it is just nothing, I will stay calm and never mind them. But if the email state not appropriate words, not true, or it will affect my reputation as an individual, I will report it to highest authority so that there will be a consequences to the sender.

6     6.   A coworker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the messages “Anonymous,” Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with the firm. What would you say to your friend?
  • ·         I will talk to him privately about his plan. There is no wrong if you send messages on the suggestion box with his real name.  So that if ever the company will read it, it is easy for them to contact you if they want to talk to you for their clarification and explanation. The company will accepts whatever their employee’s questions. So there is no reason hide his real identity and use another name. If the company will know that it is you, they will know if there is something on how they run their company. There is no wrong if you are telling the truth. Because from that they will know what they will do next.

Case Study No.3


Chapter 4- Privacy

1.      As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products store in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then display information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator move and he plans to use this data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?

·         Of course, we need to be more careful and responsible for whatever the equipment or system we have in our company. Because this system or equipment will be a great help in your company, so it will be easy to determine the processes. And whoever in-charge on the machine he has to know or has a knowledge on how to operate to avoid malfunctioning.  If there is a problem, you should report it right away to the management so that it will be fixed and the transaction will be continuous. If it is not, maybe it will cause a big problem.

2.      You have been asked to help develop a company policy on what should be done in the event on a data breach, such as unauthorized access to your firm’s customer database which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?
·         We all know that data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. But as an employee to the company you should respect or follow their policy, especially the trade secrets of the company. Educate employees about appropriate handling and protection of sensitive data. The continuing saga of lost and stolen laptops containing critical information illustrates that corporate policy designed to safeguard portable data only works when employees follow the rules. .Look beyond IT security when assessing your company's data breach risk. Establish a comprehensive breach preparedness plan that will enable decisive action and prevent operational paralysis when a data breach occurs. Your efforts will demonstrate to consumers and regulators that your organization has taken anticipatory steps to address data security threats. Disseminate this plan throughout the management structure to ensure everyone knows what to do in the event of a breach.

3.      You are new manager for a product line of Coach Purses. You are considering purchasing customer data from a company that sells a large variety of women’s products online. In addition to providing a list of names, mailing addresses, and email addresses, the data includes an approximate estimate of customer’s annual income based on the zip code in which they live, census data, and highest level of education achieved. You could use the estimate of annual income to identify likely purchases of your high-end purses and use email addresses to send emails announcing the new product line and routing its many features. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion in this instance? Why or why not?
·         Having their personal information it is easy for you to determine who your valued customers are. It is easy for you to promote your products through online. You are able to identify who will be the person can afford to your upcoming products based on their salary, because you have a record of it. But don’t look only on the salary basis. Be fair to all your customers, whether they have a big or small salary. It’s up to you how you will handle or promote your products. If you have a good relationship to your customers, they will trust and always rely on your products. For example, you have a new product that is in good quality and expensive, so that means you will look only or promote that product to those has a big amount of income only? No, you shouldn’t do that. Be fair, promote that product to all your customers whether they can afford it or not, at least they will know.

4.      Your company is rolling out a training program to ensure that everyone is familiar with the company’s IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with anticipated resistance to policy?
·         As a member of Human Resource department, we are in-charge to insure that every employee is familiar to IT usage. But we will expect that not everyone is agree on that. We will explain to them that this training is a great help to their self-esteem and confidence. I will listen to them, let them explain what is in their mind, and after that I will explain it to them until they will realize that it is a good idea to attend the training. It doesn’t mean that if you are assigned to the job that you are not using a computer, you don’t need to know how to use the computer. They will think that they don’t need it anymore. It is hard for them to learn.  That is why we are conducting this, to help them to be flexible, maybe we don’t know in the future they might need this. The training will not harm them, this can help them.


Chapter 5- Freedom of Expression

       1. A former high school classmates of yours who has returned to China emails you that he has been offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?
  • That is a good news and I am very proud of my friend. Not everyone will be given a chance to work with them. Only the chosen one and the talented. He showed them that he is good on that field. Maybe the Chinese saw and realized that he will be a great help and be trusted to work with them. It will be a great pleasure to be his friend and it brings honor to our country.

        2. Your 15-year-old nephew exclaims “Oh wow!” and proceeds to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
  •   I know that my nephew is in the stage of puberty. I will explain to him that what he wants to happen is not good.The reputation of our family and his girlfriend will be in crisis. If the school will know it, he will be in trouble, maybe they will be suspended both. They’re both parents will be called by the Principal and everyone will be talking about them. I will tell him and explain to him to understand that what they are doing is not good. If it’s continue,  it bring a bad effect to both of them. They should stop on what they are doing. And enjoy life without doing such inappropriate behavior.

          3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting. Should that fail, the PR firm will generate dozens of positive postings to outweigh the negative posting. What would you say to your friend about her idea?
  • ·         I will tell her that her idea is genius. I will support whatever her plan is. But before that we need to study everything related to our plan. It is not easy to open a firm without a knowledge about it. Her idea is great to prevent and avoid people from spamming and any other unethical behavior they are planning to do. This will help to the safety and privacy of innocent users.

         4. You are the computer technical resource for country’s public library system. The library is making plans to install Internet filtering software so that it will conform to the Children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of Internet filters? How might you deal with such objections?
  • ·         The library’s plan is great and brings protection to the minors. This plan will give protection to the children. Only the websites that is not appropriate to the children will be filtered that is not suitable for the children. It is inside the library, the library will be the source of information and knowledge to the children. It will cater only to the websites that is educational. But before we implement this plan, we have to ask permission from the community. We will accept whatever their suggestions. When the community will understand what our goal is, there will be no problem to implement it.

      5.    Imagine that you receive a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
  • ·         If ever I receive a hate email, I will handle it in the right way. I need to know first why someone sends me a hate email. What did I do? Did I hurt someone?  If I can handle it by myself, no one will know it. If it is just nothing, I will stay calm and never mind them. But if the email state not appropriate words, not true, or it will affect my reputation as an individual, I will report it to highest authority so that there will be a consequences to the sender.

        6.   A coworker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the messages “Anonymous,” Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with the firm. What would you say to your friend?
  • ·         I will talk to him privately about his plan. There is no wrong if you send messages on the suggestion box with his real name.  So that if ever the company will read it, it is easy for them to contact you if they want to talk to you for their clarification and explanation. The company will accepts whatever their employee’s questions. So there is no reason hide his real identity and use another name. If the company will know that it is you, they will know if there is something on how they run their company. There is no wrong if you are telling the truth. Because from that they will know what they will do next.

Chapter 6 – Intellectual Property

1.      1. You have procrastinated too long and now your final paper for your junior  English course is due in just five days – right in the middle of final exam week! The paper counts for half your grade for the term and would probably take you at least 20 hours to research and write. Your roommate, an English major with a 3.8 GPA, has suggested two options (1) He will write an original paper for you for $ 100, or (2) he will show you two of three “paper mills” Web sites, from which you can download a paper for less than $35. You want to do the right thing, but writing the paper will take away from the time you have available to study for your final exam in three other courses. What would you do?
  • ·         I will do the right thing in making my own paper. The grade will be based on my work, so it is a pleasure if you get a grade that you know you are working it hard and you deserve it. I need to manage my time in doing my paper. Maybe I will get some idea from the resources that I can trust, so that it is easy for me to finish it. Because if you are the one who made it, when the instructor ask about the paper, you know what is the answer and you are confident that you can answer all the question because you know what is inside the paper you made it by yourself.
      2. You are beginning to feel very uncomfortable in your new position as a computer hardware salesperson for a firm that is the major competitor of your previous employer. Today for the second time, someone has mentioned to you how valuable it would be to know what the marketing and new product development plans were of your ex-employer. You stated that you are unable to discuss such information under the nondisclosure contract signed with your former employer, but you know your response did not satisfy your new coworkers. You fear that the pressure to reveal information about the plans of your former company is only going to increase over the next few weeks. What do you do?
  •      I know what my rule as an employee is. If I came from other company, and working to the new one and they ask me about my old company trade secret, I will not tell them. It the reputation of my old company. Their success is their trade secret and they are working it hard to achieve it. I don’t want that I will be the one to destroy it. I left there company with a clean name and I will maintain it. If my new company will not respect my decision, it means that I can’t trust them. They want their company to be successful right away without working it hard to achieve it, by stealing my former employer trade secrets. They don’t know what ethics is, so there is no reason continue  working with them.

      3.   You have been asked to lead your company’s new competitive, intelligence organization. What would you do to ensure that members of the new organization obey applicable law and the company’s own ethical policies?
  • ·         If I am given a chance to lead one organization, it is an honor to me. To be able that my members obey any rules and ethical policies, it should start on me. I will show them what is in good being ethical person.  They chose me to lead one organization because they saw something that I am capable on handling one organization. As what I had told you that being a leader, it should start to yourself to be good in everything so that your members will be able to follow you or be a model to them.
   
       4. You are the vice president for software development at a small, private firm. Sales of your firm’s products have been strong, but you recently detected a patent infringement by one of your larger competitors. Your in-house legal staff has identified three options: 1) ignore the infringement out of fear that your larger competitor will file numerous countersuits: (2) threaten to file suit, but try to negotiate an out-of-court settlement for an amount of money.
  • ·         Being the vice president, it is in my hand the success of my firm. I will do whatever it takes to fight what is right and belongs to my firm. I will not ignore the other competitor, we are the one first on that idea, that is the key to our success, so I don’t want that someone will take that away from us. I don’t care I file suit for them I will fight for the truth.


Chapter 7- Software Development

1.  Should Apple conduct extensive screening of Apps before they are allowed to be sold to the App Sore?Why or why not?
  •   Yes, so that the Apple will know if one’s application is not harmful to the users. If one app also passed on their review process or application quality standards.
·          
2.   Do research to determine the current status of the FTC investigation of Apple for banning the use of the Adobe Flash software on devices that use the iOS operating system?
  •  Yes.

3.  What do you think of Apple’s guideline that says it will reject an app for any content or behavior that they believe is over the line? Could such a statement be constructed as a violation of the developer’s freedom of speech? Why or why not?
  • ·         No, that statement will be a violation to the developers. They can’t judge something when they didn’t see what is the effect or impact  on that app to the users. Don’t say right away  it is rejected unless you see it!