Chapter10: (Case 2: 2. American Engineer Blows the Whistle on Airbus’ Superjumbo A380)

    Discussion Questions


1. Discuss the importance of redundancy to such safety-critical systems as the Airbus A380’s cabin.

Answer:

This should be safe the actual safety from the people as well as team over the variety as well as originated towards the DO-178B regular. It’s the feasible failing associated with the software program to attempt to possess a feasible program specs for that failing.

2. If TTTech were located in Kansas City rather than Vienna, what protection would Joseph Mangan receive as a whistle-blower?

Answer:

Within the bed room home windows continues to be surrounded along with items due to the lack associated with cash to purchase drapes, Frederick Mangan, 41, he’s the whistle-blower along with some type of issue he’s going through towards the courtroom to possess a preventive steps.


3. Mangan risked a year in jail and went bankrupt trying to convince people of a problem. If he were simply a disgruntled employee, there are many ways he could do damage without putting himself under such pressure. Is it possible that there was a problem and that Mangan’s actions forced TTTech to address and fix it before EASA and the FAA discovered it themselves?

Answer:

Indeed. however mangan get by a good measures according to the concern as well as he or she should think about the effects with regard to he may experienced which he is able to avoid as well as safeguard themselves.

By ZeeRald

Chapter 9 ( Case 2 : Kaboodle – A Successful Social Shopping Web Site)

                     Discussion And Question

1. Register as a new user at Kaboodle (it’s free) and experiment with the social shopping Website. Briefly summarize how easy or difficult it was to join, discover products you were interested in, create a list, use the “Add to Kaboodle” button, and look at similar lists created by other members.

2. Based on your experience, what recommendations for improvements or new features do you have?

Answer:

They must assure that their products meets the taste of the customers so that the customer might patronize the product. And of course the  products should be durable and would catch the eyes of the customers.

3. Would you expect the number of members in social shopping Web sites to continue to grow over the next few years? Why or why not?

Answer:

Yes, since that our country are very advance in technology which make things easier especially when we are connected to the internet.  Many customers were interested to access easily the things that they usually do instead of going to shopping and going to malls to buy the items , they can access it through shopping online which lessens their time and effort.

By ZeeRald

Chapter 8: (Case 2: Does IT Investment Pay Off?)

Discussion and Question

1. Apart from the annual rate of output per worker, what are other ways of measuring labor productivity?

Answer:

Labor productivity is a revealing indicator of several economic indicators as it offers a dynamic measure of  economic growth, competitiveness, and living standards within an economy. It is the measure of labor  productivity (and all that this measure takes into account) which helps explain the principal economic  foundations that are necessary for both economic growth and social development.

2. What factors determine whether a new information system will increase or decrease labor productivity?

Answer:

The factors that can determine if the information increase is that the system are working properly, fast and reliable and user friendly. The labor productivity might decreases if and only if the needs of service are not meet.

3. Why is it so difficult to determine whether IT has increased labor productivity?

Answer:

It is really hard to determine whether the IT has increased it labor productivity because  we are already technological base and technology is always updating and  always developing to make it more advance and more useful as the time goes by.

By ZeeRald

Chapter 7: (Case 2: Prius Plagued by Programming Error)

Discussion Questions


1. Do you agree with NHTSA’s assessment that the problem with the Prius was not a safety critical issue? In such cases, who should decide whether a software bug creates a safety critical issue—the manufacturer, consumers, government agencies, or some other group?

Answer:

It’s a safety-critical concern that we now have issues with Toyota Prius, that is the actual deterioration from the vehicle because of software program mistakes.

2. How would the issue have been handled differently if it had been a safety-critical matter? Would it have been handled differently if the costs involved hadn’t been so great?

Answer:

The problem had been dealt with through ensuring, based on Toyota spokesperson, Allison Takahashi, “we tend to be under your own accord starting the customer-service marketing campaign to make sure this uncommon event doesn’t trigger hassle. ” You will find absolutely no points dealt with in a different way because it didn’t slowed up their own product sales however elevated rather.


3. As the amount of hardware and software embedded in the average car continues to grow, what steps can automakers take to minimize warranty claims and ensure customer safety?

Answer:

 If the amount of hardware and software embedded in the average car continues to grow, the following steps must be implemented to minimize warranty claims and to ensure the customer safety. Such as, implementing different many safety-related systems, include:
• Anti-lock brakes - ensures the brake are not automatically.
• Steering wheels –  wheels should always in a condition
• Air bags – safety measures for any car accident

By ZeeRald

CHAPTER 6 : ( CASE :1. Intellectual Property and the War over Software Maintenance)

Discussion Questions

1. According to Oracle, how was TomorrowNow violating intellectual property law?

Answer:

Oracle filled a lawsuit on march 22, 2007, in US distidct court alleging that SAP had violated the federal computer fraud and abuse act as well as california law through the actions of tomorrow Now. Tomorrow Now are being accused because of downloading a thousands of documents from oracle and copyrighted materials that contains software update, patch and bug fixes and instructions.

2. Why do you think Oracle used SAP?

Answer:

The reason behind why oracle used SAP because of SAP the customers can leverage the power of the world’s leading databases to reduce their server and storage costs, eliminate idle redundancy and improve quality of service. Since the oracle became the leading in software provider especially in database management system.


3. What do you think should be done, if anything, to open the maintenance contract market to third-party contractors?

Answer:

Some data may be lost because technical data security measures are installed incorrectly by contractors, and their alarms and messages are misinterpreted. Third-party vendors are one option, but the level of support they can provide depends on the level of access that the software provider is willing to offer these third parties.

By ZeeRald

CHAPTER 5 : ( CASE : 1.The Online Reputation War)

                                                  Discussion Questions
1. Do you think it is ethical to pursue a strategy to counter online criticism and defend your organization’s reputation? Why or why not?

Answer:

For me yes, Because we need to carry out the name of the organization in having a good reputation so that many will follow and will like and follow of the said organization.

2. What steps do you think businesses should take when promoting their products and services online? What tactics, if any, should businesses avoid?

Answer:
We all know that today we are dealing with our business through online, is it because we are so advance in technology.
There are a lot of company who are promoting their products in oder to catch the taste of the corrresponding customers.
Here are the tactics that the company are doing there product promotions:
*The company must know their customer target.
*They must provide the clear and approriate information of their products and services that will catch the attention of thrie customers.
*They must associate with the networking site that commonly people visited, especially facebook.
*Letting the famous person endorsed the said product and services to add a large of market value.


3. How should IT professionals and others respond to people with hidden agendas who post negative comments about them on social media sites? What should online visitors do to detect misinformation posted in blogs?

Answer:

The IT professional must take a immediate action of this case so that they wil not be blamed. If the blog detect a negative comment
it should not be shown or published in publicity.

By ZeeRald

CHAPTER 4: (Case 2. How Secure Is Our Healthcare Data?)

Discussion and Question

1. What type of security breaches of medical records are common today?

Answer:

Medical association is one of the common target of identical fraud because they contain a lot  of records that can be used for accessing the personal data of the patient. Like for example the security account, credit card and any personal data from the patient will be use for the illegal transaction without knowing of the owner itself.

For the immediate solution of this issue the association formulate  a common security framework to provide shared standards and procedures for access control, human resource security, physical and environmental security, information security incident management, and many other areas directly or indirectly related to privacy breaches.

 

2. What measures are being taken by the government and private industry to safeguard EHRs?

Answer:

Regarding this issue, a  group of government, agencies, corporations, and universities launched a research center dedicated to the study of identity fraud. The Center for
Identity Management and Information Protection is dedicated to furthering a national
research agenda on identity management, information sharing, and data protection.                                                                        

Below are the safety measures by which the government established and acted to eliminate the numbers of identical-theft.

  • Data breach guidance to agencies 
  •  Development of universal police report for identity theft victims
  •  Extending restitution for victims of identity theft 
  •  Reducing access of identity thieves to Social Security Numbers 
  •  Developing alternative methods of authenticating identities 
  •  Improving data security in the government 
  •  Improving agencies’ ability to respond to data breaches in the government.

3. How do you think the implementation of ARRA will affect the privacy of our healthcare and personal data?  What breaches do you foresee? How can they be forestalled?

Answer:

The implementation of ARRA really affect the privacy of the healthcare  and personal data, since all the information of the patient are being stored to the electronic system which is not totally secure. This will affect to the information of the patient because there information could be stolen and their is a tendency that there will be a lost of their  accounts and any of their transaction cards.

The breaches that I could foresee in this case is the identical fraud ,  the issue of data lost and insecurities.

They could be forestalled if the association will largely implement total and complete security of the patient’s personal data and personal information. This will help to terminate the numbers of the identity-theft and to kept the patient’s record secured.

By ZeeRald

CHAPTER 3 (CASE 2. The Storm Worm)

Discussion Questions

1. What harm does a worm cause to the public, Internet service providers, and e-mail service providers? Are there other reasons why many people object so strongly to the spread of worms?

Answer: 

                    The worm is known as the Trojan horse that attack to the operating system in which do damage once installed or run in the computer. This is very malicious software that gives warning alert to the public, and also it create a lot of burdens for all the computer users.

                   Due to copying nature of worm and its capability to travel across networks, the worm consumes too much system memory causing the web servers or the Internet Service Provider slows down that cause it to stop in responding.

                 The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. This create a huge problem for the E-mail Service Providers because instead of sending a single message it copy itself  and replicates that everyone listed in the address book receives it.

                  The worm has been designed to tunnel into your system and allow malicious users to control your computer remotely.
2. What would you say or do if you received an e-mail that guaranteed you $20 per month if you agreed to permit your computer to be used to send e-mail during hours you are not using it?

Answer: 

                 If I could received an e-mail that guaranteed me a $20 per month I would rather disagree because I am concerned with the security I could have if I could have access with email. As we all know that kind of email was considered as spam. They could use us just to gain access in behalf of us.   I will not use it, because they can manipulate my email and also it can damage my system.


3. Do you feel it is objectionable to let others use your computer to execute files without your prior knowledge or consent? What if it were for a good cause, such as destroying a worldwide botnet, such as that created by the Storm worm, or running an application that analyzes research data related to finding a cure for cancer?

Answer: 

For me, Yes, it is very objectionable because we don’t allow others to view and execute our files especially personal and most confidential files. That is why we put prior security to our computer to let no one can view our restricted files. 

If there is really a big good cause that result to the  destroying a worldwide botnet, such as that created by the Storm worm, it is such a really good news because there are already a solutions for the problem that everyone are seeking for. In this case, the problem that are considered as the cancer in our modern technology can be cured already.

By ZeeRald

Chapter 2: (Case 1. Google Named in $1 Billion Trade Secret Lawsuit)

                                                           Discussion Questions

1. This incident illustrates some of the potential problems for small software developers working with giant software manufacturers to extend or enhance their products. Provide two good reasons why small developers should still consider working closely with large software firms.

Answer:

        1. Small developers work closely with large software firms because they need a backer to help them launch their products and to support them financially.

        2. They also need to accommpany with the giant manufacturers so that their products will be known and can be endorsed into a large market.

2. What measures could Limit None have taken to better protect itself from Google’s alleged actions? What measures could Google have taken to protect itself from this lawsuit?

Answer:

The action that the Limit None would have done to protect itself from Google’s alleged actions is that they could have partnered with other company that would assure them that they will only use their products. And on the other hand, the Google company should have followed what was stated in their agreement with the Limit None so that their wouldn’t be any lawsuit that happened.

3. Do research on the Web to find out how this case is proceeding in the courts. Write a shortsummary of your findings.

Answer:

 

By ZeeRald

Chapter 1: (Case 1. Computer Associates: A Firm with a Scandal-Riddled Past)

Discussion Questions

1. CA executives involved in the accounting scandal were not accused of reporting bogus contracts or hiding major problems in the business. The contracts that were backdated were real sales agreements. Was this really a crime? Should the individuals have been punished so harshly?

Answer:  Yes, this is really a crime because the Computer Associates had violated the law, since they reported not genuine contracts that led to a serious crime. Those individuals that are involved with this crime will be punished accordingly because they made for personal gain and damage to another individual.

2. In December 2004, CA appointed Patrick J. Gnazzo as senior chief compliance officer to demonstrate to the government and shareholders that the firm would take measures to operate ethically. Gnazzo served in this role at United Technologies for 10 years and had been a member of the board of directors of the Ethics Officers Association. Gnazzo reported to a new executive vice president and general counsel at CA as well as the board’s Compliance Committee. Outline some of the actions Gnazzo might have taken in his first six months on the job.

Answer:  Patrick J. Gnazzo became a senior vice president and general manager of CA’s Public Sector business. In this position, Pat heads up all operations for CA’s Federal, State and Local government business, including management, administration, and regulatory matters, as well as government relations. He was a business practices, and chief compliance officer at CA, responsible for developing and implementing a comprehensive compliance and ethics program.

3. John Swainson, a 26-year veteran of IBM, joined CA in November 2004 as CEO and president. His first few months with the firm were rough—major customers threatened to dump the firm; some products were behind schedule and were of poor quality; executives had to be fired for breaking company rules; accountants continued to find past mistakes; and many newly hired executives had to be brought on board. What sort of leadership could he have demonstrated to show that he was determined to avoid future scandals at CA?

Answer:  From this discussion Mr. John Swainson shows his leadership as being a passionate. He has a passion for the customer that is unsurpassed, and an understanding of how to execute on a technology vision that drives revenue growth. He possesses a unique set of skills, including development, sales and marketing that combined make him a tremendous manager and the right person to lead CA as it continues to move forward.

4. CA has been hit with numerous scandals since the late 1990s. These scandals raise questions about how successful the firm might have been if not for the amount of time its executives had to spend on these distractions. Compare the revenue growth and stock price of CA to that of some of its competitors over the time period 2004–2008. (Be sure to use CA’s corrected figures!) Can you detect any impact of these scandals on CA’s performance? What else might explain the difference in performance?

Answer:  At the period of 2004 and 2008 the growth and stock price of CA has increased compared to the other competitors. The impact of these scandals of CA’s performance is that, it made their firm’s stocks look more attractive to investors.

By ZeeRald