Saturday, February 21, 2015

case study (chapter 4,5,6,7)


 Chapter 4
1. Your friend is considering using an online service to identify people with compatible personalities and attractive physical features who would be interesting to date. Your friend must first submit some basic personal information then complete a five-page personality survey, and finally provide several recent photos. Would you advise your friend to do this? Why or why not?
Answer:
For the real me, of course I will allow her/him whatever he/she wants to do. But as friend of him/her or let’s assume she’s a girl and in the same case I am also an Information technology students, of course I will not allow her. It is because it is not trustworthy to submit any information to that site without any assurance that their not doing the fraud thing or maube it is an identoty theft. I’ll explain to her that it is not safe, mostly with that five page of personal information together with the recent photos. She must make it sure first that the information she’ll be submitted will be secured by the said dating site she must going to join.
2. You are a recent college graduate with only a year of experience with your employer. You were recently promoted to manager of email services. You are quite surprised to receive a phone call at home on a Saturday from the Chief Financial Officer of the firm asking that you immediately delete all email from all email servers, including the archieve and back-up servers that is older than six months. He states that the reason for this request is that there have been an increasing number of complaints about the slowness of email services. In addition, he says he is concerned about the cost of storing so much email. This does not sound right to you because you have taken several measures that have actually speeded up email services. You recall a brief paragraph in the paper last week that stated several suppliers were upset about what they called “price fixing” among the companies in you industry. What do you say to the Chief Financial Officer?

Answer:
i’ll say to him, that I can’t delete all of the emails on the said server beacuse on my own I’m pretty sure that I took several measures for those data and everyone has their own Privacy. And this privacy has its communication and data privacy which I cannot easily erase all of the data that has been stored on the servers. That data maybe have also included of their trust where I gained from the users and help me to promote the safetiness of my data privacy. And instead of removing all of the data, I’ll think another percautions to help the processing avoids slowness.
3.You have 15 years of experience in sales and marketing with three different organizations. You currently hold a middle management position and have been approach by a headhunter to make a move to a company seeking a chief privacy officer. The headhunter claims the position would represent a good move for you in your career path and lead to an eventual vice president of marketing position. You are not sure about the exact responsiblities of the CPO position or what authority the person in this position would have at this particular company. How would you go about evaluating this opportunity to determine if it actually is a good career move or a dead end?

Answer:
I’ll conduct any survey or investigation or some research of what the CPO positions do, what’s its benefits or any research of what is the difference between the two positions (the one you possess or the one you’re going to possesed) and a research if it is not a scam. You’ll have to make sure that you’re not deciding a dull decision. Secure your position, it may be lost. Or grab the opportunity if you have discovered that it is not a false offer.
4. As the information systems manager for a small manucfacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time and forklift operator identification number. This data is trasmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
 The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?
Answer:
I think there are no problems with it. Storing any data on the electronic is an advantage than doing it manually, especially in this case. I will tell him that it is a good idea but the data must be secured and could not be edited with the other control computer. There must be a registered DB-admin to manipulate such data or to monitor to properly report what the manager wanted to have that report, such as the monitoring the job potentials of his workers.
5. You have been asked to help developed a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database,which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?
Answer:
I’ll see for my self their previous CBL and think thoroughly what would be the best policy to be implemented. A policy that’s different from the recent policies, a policy that is not redundant. I’ll also include the security measures of all the data that has been inserted on the same database. I’ll include on that policy that an unauthorized personnel would not be allowed to access such data. And i’ll also include during the planning session that the records must be backed-up and that they need to redo the security of it.
Chapter 5
1. Your friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He asked you dedsign a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark. However, much of the information in the Web page will include discussion of his personal success in various traithlons and marathons in which he has competed. Many of these events has corporate sponsors and carry their own trademark. He has asked you if there are any potentails trademark issues with his marketing plans. What would you do?
Answer:
Yes, there are potentials among the different sponsor’s trademark. Each company has their own product’s trademark which differentiate from others.it is an act of trademark infringement. Maybe, if i would design it for my friend, I will just include those trivia of his success and any information of his accomplishments but I will just never include or display those trademarks of different sponsors.
2. Because of the amount of the expense, your company’s CFO had to approve a $500,000 purchase order for hardware and software needed to upgrade the service used to store data for the Product Development Department. Everyone in the department had expected an automatic approval, and they were disappointed when the purchse order request was turned down. Management said that the business benefits of the expenditure were not clear. Realizing that she needs to develop a more solid business case for the order, the vice president of Product Development has come to you for help. Can you help her identify arguments related to protecting intellectual propertythat might strengthen the business case for this expenditure?
Answer:
Protecting intellectual property is important in world trade. They must provide a very specific and a concise idea for developing a more solid business case and must be elabrated clearly. It must be worked by a team and must be approved to the body or a group.
3. You are interviewing for the role of human resources manager for a large software developer. Over the last year, the firm has lost a number of high-level executives who left the firm to go to work for competitors. During the course of your interview, you are asked what measures you would put in place to reduce the potential loss of trade secret from executives leaving the firm. How would you respond?
Answer:
I will tell him to explain to them the value of the trade secret, that the trade secret is a business information and it represents something of economic idea. That this trade secret must valued because it helps one’s company from growing and it has an independent idea from the other company and it should not be spread.
Chapter 6
1. A former high school classmate of yours who has returned to china emails you that he has been offered a part-time job monitoring a Chinese website and posting comments favorable to the government. How would you respond?
Answer:
I’m gonna ask him if he really likes the job, or does he oriented on what their government had, does he knew the characteristics of the employer he must be working on. Because mostly, the people would really comments and its based on (Freedom of Information Act (1996 amended 1974) grants citizens the right to access certain information and records of the federal government upon request.)
I’ll tell him that he need to make it sure that it is a legal website that he could not be found a criminal on a cyberspace where all of the comments must be posted on the website he’s going to monitor. If he is a aware on libel defamation or the concern of the freedom of speech.
2. Your 15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very reavealing photo attachment he just received in a text message from his 14 year old girlfriend of three months. He Can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
Answer:
I’ll explain to him that it’s not a good thing to do, or it’s not a good idea to be taken. That’s private and i’ll discuss more or deeply towards that sexting for him to know or to be oriented that it is not good to play with with that matter. And besides their both young and regarding to the relationship they had, thay are protected by the government and they’re still belong to the childhood stage where there would be an act for that issue. A CDA (communications decency Act) where protects the children on pornography, I’ll tell him that if he do that so, then, he’ll be put to prison one day when he reach at the age of maturity or the age where people are pretty well to be seized. And maybe by that he’ll understand. I will not shout at him or scold him instead I’ll talk to him well so he will not act an rebellious deeds.
3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to treathen negative posters with a libel lawsuit unless the y remove their posting. Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting. What would you say tp your friend about her idea?
Answer:
I’ll tell my friend that I am agree with her idea. As an incharge of monitoring the PR, she must be the first that has been oriented about the libel lawsuit, and that the libel is a crime which states a written defamatory statements. I’ll advise him to take that action immidiately. Maybe it is not so easy to be implemented but atleast it’ll cure and may not be to prevent.
4. You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the childrens Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?
Answer:
Maybe they’ll object that there are some websites that cannot be open. But as the internet filtering be implemented, I’ll also implement or display the cause and the other precautionary measures for them to understand and agree the internet filtering for their own good. So internet may not be the source of harming one another.
5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that cover such issues?
Answers:
I’ll report to the Dean that hate email if it really hurt me so much and much more if the sender is to be located at the same school I’m in. But if it’s not so easy to be located then why should I make tired of my self. I’m gonna stop thinking of it and in fact that f*cker didn’t get me anything. And besides, our school doesn’t implemented that policy, seems like “It doesn’t matter to them” well, poor students! J

Chapter 7
1. Apple Guidelines for App Approval
Apple’s App Store has been a huge success ever since it was launched in 2008. As of the end of 2010, the app store offered more than 250, 000 applications available for sale to owners of apple, iPhone, iPad and iPod devices, with more than 6.5 Billion downloads since it opened.
Before software applications can be solved throught the App Store, they must go through a review process. Apple has been accused by some of using clandestine and capricious rules to reject some programs and thus blocking them from reaching the very large and growing market of iPhone, iPad, and iPod touch users. One application developer complained: “ if you submit an app, you have no idea whats going to happen. You have no idea it’s going to be approved or if it’s going to be disapproved.” The developers of an app called “South Park” complained that their app was rejected because the content was deemed “potentially offensive ,” even though episodes of the award-winning animated sitcom are available at the Apple iTunes Store. In September 2010, after more than two years of complains, apple finally provided applications developers the guidelines it uses to review software.
Most guidelines seem to be aimed at ensuring that Apple users can only access high quality and non-controversials Apps from its Apps Store. Some of the Apple guidelines are clear and their rationale is easy to understand, such as “ apps that rapidly drain the device’s battery or generate excessive eat will be rejected.” However, other guidelines are unclear and highly subjective, such as “ we will reject apps for any content or behavior that we believe is over the line.” What line, you ask? Well, as a Supreme Court Justice once said ,“ I’ll know it when i see it. ‘ and we think that you will also know it when you cross it. (“ I know it when I see it” was the phrase used by U.S Supreme Court Justice Potter Stewart to describe his ability to recognize rather than to provide a precise definition of hard core pornography and his opinion in the cae Jacobellis v. Ohio in 1964.)
The electronic frontier foundation believes that while the guidelines are helpful, in some cases apple is defining the content of third-party software and placing limits on what is available to customers of Apple’s App Store.
By way of comparison, Google places few restrictions and developers of software for its competing Android Marketplace. However, there have been many low-quality applications offered to Android Marketplace customers, including some that include unwanted malware. Indeed by early 2011, google had pulled 21 Android applications from its Android Marketplace because, once downloaded, the applications not only stole users’ information and device data but also created a back door for even more harmful attacks. Apple’s decision to finally share applications guidelines may have been an attempt to combat the rapidly increasing popularity the android. It may also have been a response to a U.S Federal Trade Commissions investigations of a complaint for Adobe concerning Apples banning of the flash software from devices that run using Apple’s iOS operating system (Adobe Flash player is a browser-based applications that runs in many computer hardware/ operating system combination and support the viewing of called “rich, expressive applications,” content, the videos across screens and browsers .)
Discussion Questions:
1. Should Apple conduct extensive screening of Apps before they are allowed to be sold on the App Store? Why or why not?

Answer
Yes, to check if their software consist of potentially offensive stuff. To make sure that their apps will not harm the other. To check if their idea is owned by them and not just they’re doing the reverse engineering.
2. Do research to determine the current status of the FCC investigatin of Apple for banning use of the Adobe Flash software and devices that use the iOS operating system.
Answer

3. What do you think of Apple’s guidelines that say it will reject an App for any content or behavior that they believe is over the line? Could such statement be construed as a violation of the developer’s freedom of speech? Why or why not?
Answer
For me NO. It is not a violation, maybe it is not-so-easy to comprehend but whe you go deeper beyond its definition you’ll see it for yourselt of what does it mean. Just like the U.S Supreme Court Justice Potter Stewart stated that “ I know it when I see it” that he should see for himself of what it overlapped. Everyone has its own definition of limitation, everyone has its own definition of bad stuffs. Everyone sees bad as good and good as bad. Maybe it just deliver the statements that we are the one capable of understanding what should be the limitations taken by one application or a software.

Sunday, December 28, 2014

Second Assignment-7 questions(answered)

Answers:
1. Well for me, it's just the same with the words "I DON'T CARE". but these words doesn't really mean that you really don't care. It's just a matter of fact that you do respect both sides. You cannot dictate ones opinion, they have their privilege to think and to say, they have their own capabilities of understanding different issues or somewhat we say promulgation. Respect is the key of having a good camaraderie with one another's team mate. 

2. My tempering mode during the moment when I'm mad. I'm a fan of hurting people and I'm also a fan of being hurt. i love torturing ones emotion. Well, I think that the most experienced that molded my personal code of ethics is the place where i'm standing especially in life, we're not on a first class, yes, we're poor but I think we're not also in the poorest class. Cause we still eat a meal three times a day. It's also my dreams in life that had molded me and that dreams are molded also by the difficulties I'd experienced. I really need to set standards in life but before tat I must build first my code of ethics. And, by that life goes on.

3.Yes, it really depends. But, if I'll examine it through my position today, It really depends on my responds to them. It is about how wold you react from different issues that has been raisin' up. It is about when you say something or would you just shut your mouth. It is upon your mood, and how you handle your mood.

4.Yes, they are capable. But, the top responsibility of the organization is keeping it from any harmful intentions of different employees. But, it is also depending upon a company of how they would respond this case. If they would hide the issue and escape from the criminal liabilities as a white lies goes? or they would not defend their member as what the right goes? It's up to them.

5.Yes, of course! as we see nowadays favoritism's explode. No more explanations. It always been repeated by the reality.

6.Speaking of tolerated. Yes, it is. software piracy is leading today. Philippines is the best example of it. We claimed software, we used software and e cracked software. Even school used to do it, even DOSCST used to do it. We cannot deny the fact that today in this modern world we are free to claim any software. We copied illegal and use without permission of the owner. Mostly IT professionals do it. We don't have any case to take so we crack. Tsk!

7.No. it's never been a waste of time but it's a time consuming processes that would take too much time to learn. How could someone accept that they are needed to be trained? or maybe they are just so stubborn that they will not allow anybody to teach them. But, it's the fact, when you try to be taught and to learned? swear, it's these magic that would take you to success.

Tuesday, December 9, 2014

Why does IT's doesn't have a license exam.

Information Technology doesn't have a licensure exam, well I think it because being an Information Technologist is so easy to achieve. You learn it easily or maybe just by your own. It is so easy to be achieved even just in surfing in internet. There's no such expertise to be exercised. 
I find it helpful to learn from other well-established professions like medicine or law. One of the most striking aspects of professions is their longevity and durability. This is no accident. Professions form around domains of permanent human concerns: things that concern everyone, in all times, places, and cultures. For example, no human being can escape health concerns. Sooner or later everyone has a health breakdown and seeks professional help. The health-care professional needs deep expertise to be helpful, expertise well beyond what an amateur can learn by reading or by word of mouth. The health-care professional must be well trained and oriented toward helping people. Similar statements can be made about law. No human being can escape concerns about laws where they live and work. There comes a time, sooner or later, when everyone seeks professional help with legal problems such as mortgages, deeds, wills, trusts, business deals, taxes, and much more.We will just recognize those persons being an Information Technology professionals through knowing "Our traditional view of computer scientists as programmers and systems analysts is far too narrow. Traditional computer science does not address the full range of concerns people have about information technology and is frequently criticized for various types of narrowness. Let me give you some examples. Few computer science departments offer specialties in information security, now a leading concern of users of information systems. Many software engineers now believe that traditional computer science programs are too narrow to accommodate the scientific and professional core of software engineering; they are moving to establish separate degree programs and departments. Many employers believe that computer science departments overemphasize theory; they rely on their corporate universities to close the gap by supplying practical training in IT. 


Computer science departments do not address the educational needs of all those help-desk technicians -- the people who answer telephone questions about software and personal computers. Although not trained as computer scientists, these technicians are taking care of other people's concerns about their computers and networks. They are, in my book, bona fide members of the IT profession. The same can be said of professional website designers."
That's why, I am not convinced in licensure exam just because we, as an IT studies in broad. we're not focusing in just one field but almost in different fields. We do works in simultaneous jobs. We create, tranform and innovate and that's what i admired the most. I really love to be an Information technology Professional no matter what, it may include license or it may not. It is my passion and it will be forever my passion.