Name:
Lyra Joy M. Escabusa BSIT-III
CHAPTER 4
1. Your
friend is considering using an online service to identify people with
compatible personalities and attractive physical features who would be
interesting to date. Your friend must first submit some basic personal
information then complete a five-page personality survey, and finally provide
several recent photos. Would you advise your friend to do this? Why or why not?
Answer:
Of course not, I don’t want my friends life and private life to be in danger.
What she is planning to do will be harmful to her privacy. Everyone will be
able to see and can read her informations. There is an advantage like, she can
make friends with anyone on that site but it is not safe. Maybe she can input
some informations but not those very private ones.
2. You
are a recent college graduate with only a year of experience with your
employer. You were recently promoted to manager of email services. You are
quite surprised to receive a phone call at home on a Saturday from the Chief
Financial Officer of the firm asking that you immediately delete all email from
all email servers, including the achieve and back-up servers that are older
than six months. He states that the reason for this request is that there have
been an increasing number of complaints about the slowness of email services.
In addition, he says he is concerned about the cost of storing so much email.
This does not sound right to you because you have taken several measures that
have actually speeded up email services. You recall a brief paragraph in the
paper last week that stated several suppliers were upset about what they called
“prince fixing” among the companies in your industry. What do you say to the
Chief Financial Officer?
Answer:
It doesn’t mean that he is the Chief Financial Officer he has the right to
command me on deleting those emails. I can sense that there is a reason behind
the act. He is hiding something and what he wants me to do is against my work.
But since I am just an employee, I will do what he is asking for but I will
make sure I will have my own back-ups and copies in case I will be needing that
soon. It is better prepared than repent my actions.
3. You
have 15 years of experience in sales and marketing with three different
organizations. You currently hold a middle management position and have been
approach by a head-hunter to make a move to a company seeking a chief privacy
officer. The head-hunter claims the position would represent a good move for
you in your career path and lead to an eventual vice president of marketing
position. You are not sure about the exact responsibilities of the CPO position
or what authority the person in this position would have at this particular company.
How would you go about evaluating this opportunity to determine if it actually
is a good career move or a dead end?
Answer:
I will ask informations about what CPO is. I should know the works of the CPO,
the advantages if I’m going to accept the offer. If it will lead me to a better
career then I will take it. But I will have to weigh things first, I don’t want
to sacrifice my current position. I am contented of where I am now but if that
opportunity is good then there’s no harm in grabbing and trying it.
4. As
the information systems manager for a small manufacturing plant, you are
responsible for anything relating to the use of information technology. A new
inventory control system is being implemented to track the quantity and
movement of all finished products stored in a local warehouse. Each time a
forklift operator moves a case of product, he or she must first scan the
product identifier code on the case. The product information is captured, as is
the day, time and forklift operator identification number. This data is
transmitted over a local area network (LAN) to the inventory control computer,
which then displays information about the case and where it should be placed in
the warehouse. The warehouse manager is excited about using case movement data to
monitor worker productivity. He will be able to tell how many cases per shift
each operator moves and he plans to use this data to provide performance
feedback that could result in pay increases or termination. He has asked you if
there are any potential problems with using the data in this manner and, if so,
what should be done to avoid them. How would you respond?
Answer:
I will always keep an eye to the new inventory control system. I should be
extra careful and always keeping track of the informations. Being dedicated to
my work is the best way to avoid those possible potential problems. Exerting
extra effort will help.
5. You
have been asked to help developed a
company policy on what should be done in the event of a data breach, such as
unauthorized access to your firm’s customer database, which contains some 1.5
million records. What sort of process would you use to develop such a policy?
What resources would you call on?
Answer: Think those best resources that will be able
to help and improve the company policy.
Secure
everything. Start from the beginning.
CHAPTER
5
1. your
friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and
26.2-mile run). He is also a popular and well-known marathon runner throughout
the Southwest. He asked you design a Web page to promote the sale of a wide
variety of health products, vitamins, food supplements, and clothing targeted
at the athletes training to participate in the triathlon. The products will
carry his personal trademark. However, much of the information in the Web page
will include discussion of his personal success in various triathlons and
marathons in which he has competed. Many of these events has corporate sponsors
and carry their own trademark. He has asked you if there are any potentials
trademark issues with his marketing plans. What would you do?
Answer: Its okay to include his trademarks because it
is his web. The content of the web is his informations and success but then it
is also appropriate to include the trademarks of his sponsor. Credits should be
given to those real owners.
2.
Because of the amount of the expense, your company’s CFO had to approve a
$500,000 purchase order for hardware and software needed to upgrade the service
used to store data for the Product
Development Department. Everyone in the department had expected an
automatic approval, and they were disappointed when the purchase order request
was turned down. Management said that the business benefits of the expenditure
were not clear. Realizing that she needs to develop a more solid business case
for the order, the vice president of Product Development has come to you for
help. Can you help her identify arguments related to protecting intellectual
property that might strengthen the business case for this expenditure?
Answer: She should list down the things that will
help strengthen the business. Study the different parts of it. If she will be
able to do those, it might help her approve the order.
3.
you are interviewing for the role of human resources manager for a large
software developer. Over the last year, the firm has lost a number of
high-level executives who left the firm to go to work for competitors. During
the course of your interview, you are asked what measures you would put in
place to reduce the potential loss of trade secret from executives leaving the
firm. How would you respond?
Answer: The
relationship of the employer to employee should be good. I will tell them that
what I can offer is what I can do and I will be contented of what the firm is
capable of. As long as I will be happy and loving my work there then its fine.
Chapter 6
1. a
former high school classmate of yours who has returned to china emails you that
he has been offered a part-time job monitoring a Chinese website and posting
comments favourable to the government. How would you respond?
Answer: It is not an ethical work. It can harm him
when everything goes wrong. I am just concern with him especially that the
country he is working is not where he came from. It is dangerous for him to
take risk. I wont let him do the part-time job.
2. your
15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very
revealing photo attachment he just received in a text message from his 14 year
old girlfriend of three months. He can’t wait to forward the message to others
in his school. What would you say to your nephew? Are further steps needed
besides a discussion on sexting?
Answer: I will talk to him in private that he will be
able to understand and get my point about sexting being unethical. Aside the
fact that it is not appropriate at his young age, what he is planning to do
which is to send what he receives may humiliate the person involve. I will not
let him do those acts.
3.
a college friend of yours approaches you about an idea to start a PR firm that
would specialize in monitoring the internet for “Bad PR” about a company and
“fixing” it. One tactic the firm would use is to threaten negative posters with
a libel lawsuit unless they remove their posting. Should that fail, the PR firm will generate
dozens of positive postings to outweigh the negative posting. What would you say to your friend about her
idea?
Answer:
the idea has a point but when you will base it on ethical values then it is
wrong doing. He is not being honest. O still believes that honesty is the best
policy.
4. you
are the computer technical resource for country’s public library system. The
library is making plans to install internet Filtering Software so that it will
conform to the children’s Internet Protection Act and be eligible for federal
funding. What sort of objections can you expect regarding implementation of
internet filters? How might you deal with such objections?
Answer:
It is a good idea and I guess what matters is that it cant harm the children.
5.
imagine that you received a hate email at your school or job. What would you
do? Does your school or workplace have a policy that cover such issues?
Answer:
I don’t care about any hate emails if I received one. It wont affect me because
I know what I am doing. I will just think they are insecure. Anyway, they cant earn
money in sending me hate emails.
Chapter 7
1.
Apple Guidelines for App Approval
Apple’s
App Store has been a huge success ever since it was launched in 2008. As of the
end of 2010, the app store offered more than 250, 000 applications available
for sale to owners of apple, iPhone, iPad and iPod devices, with more than 6.5
Billion downloads since it opened.
Before
software applications can be solved through the App Store, they must go through
a review process. Apple has been accused by some of using clandestine and
capricious rules to reject some programs and thus blocking them from reaching
the very large and growing market of iPhone, iPad, and iPod touch users. One
application developer complained: “ if you submit an app, you have no idea
whats going to happen. You have no idea it’s going to be approved or if it’s
going to be disapproved.” The developers of an app called “South Park”
complained that their app was rejected because the content was deemed
“potentially offensive ,” even though episodes of the award-winning animated
sitcom are available at the Apple iTunes
Store. In September 2010, after more than two years of complains, apple
finally provided applications developers the guidelines it uses to review software.
Most
guidelines seem to be aimed at ensuring that Apple users can only access high
quality and non-controversial Apps from its Apps Store. Some of the Apple
guidelines are clear and their rationale is easy to understand, such as “ apps
that rapidly drain the device’s battery or generate excessive eat will be
rejected.” However, other guidelines are unclear and highly subjective, such as
“ we will reject apps for any content or behaviour that we believe is over the
line.” What line, you ask? Well, as a Supreme Court Justice once said ,“ I’ll
know it when i see it. ‘ and we think that you will also know it when you cross
it. (“ I know it when I see it” was the phrase used by U.S Supreme Court
Justice Potter Stewart to describe his ability to recognize rather than to
provide a precise definition of hard core pornography and his opinion in the
cae Jacobellis v. Ohio in 1964.)
The
electronic frontier foundation believes that while the guidelines are helpful,
in some cases apple is defining the content of third-party software and placing
limits on what is available to customers of Apple’s App Store.
By
way of comparison, Google places few restrictions and developers of software
for its competing Android Marketplace. However, there have been many
low-quality applications offered to Android Marketplace customers, including
some that include unwanted malware. Indeed by early 2011, google had pulled 21
Android applications from its Android Marketplace because, once downloaded, the
applications not only stole users’ information and device data but also created
a back door for even more harmful attacks. Apple’s decision to finally share
applications guidelines may have been an attempt to combat the rapidly
increasing popularity the android. It may also have been a response to a U.S
Federal Trade Commissions investigations of a complaint for Adobe concerning
Apples banning of the flash software from devices that run using Apple’s iOS
operating system (Adobe Flash player is a browser-based applications that runs
in many computer hardware/ operating system combination and support the viewing
of called “rich, expressive applications,” content, the videos across screens
and browsers .)
Discussion Questions:
1. should
Apple conduct extensive screening of Apps before they are allowed to be sold on
the App Store? Why or why not?
Answer:
Yes, because they always make sure that their apps is good before selling it
then it’s the best thing to do.
2. do
research to determine the current status of the FCC investigation of Apple for
banning use of the Adobe Flash software and devices that use the iOS operating
system.
Answer:
3. what
do you think of Apple’s guidelines that say it will reject an App for any
content or behaviour that they believe is over the line? Could such statement
be construed as a violation of the developer’s freedom of speech? Why or why
not?
Answer:
Maybe, because they didn’t elaborate what they mean about that line. A lot may
interpret it in any way and misunderstood it.