Feel Free to Stay ;)

Thursday, May 17, 2012

Chapter 10: Vignette and Case Study

Vignette: Problems with Suppliers

     1.    How can an organization ensure that all the members of its supply chain will behave ethically?

              First and foremost, organizations with their relationship with their suppliers must be clear, fair and both parties meet each other’s needs. Ensuring that all members of supply chain will behave ethically is quiet hard. To risk important information, trust and even money in the progression of the company is not that easy. Each party must well comprehend the importance and value of each one’s precious presence in the growth of their own businesses. They may also be aware that they are dependent and beneficial in each other’s tasks and duties. The very good, nice and kind relationship somehow helps to have a good partnership, and possibly the best assurance to ensure that members will behave ethically that they both consider each side’s improvement. But even if it’s easy to say that was the best assurance I think, still, its quiet impossible to attain. That’s why I also suggest having a legal and fair contract asserting that each party must and should do their intended duties and no other duties beyond that like doing unethical matters, they must conform by the rules and basis that stated, and sue for the failure of not doing it right. It’s really a matter of conscience, to do or not to do, to do it right or do the right thing, a matter of choosing from what is best or what is  better. In like manner, accepting things and be prepared for the unexpected or unwanted outcomes. Because no matter how hard you try to safeguard your business, there are still chances that you failed in doing so. If it’s really meant to happen, it just happens.

    2.  What responsibility does an organization have to ensure that its suppliers and business partners behave ethically?

                Everyone’s responsibility is to do things what we are committed to do. In short, doing the right thing, choosing the right one is what each of us are obliged to do. In relate to business, where in world in highly competitive against the others, we can’t deny the fact that sometimes we can commit improper execution. It is very much important to preserve, observe and maintain good ethics in any chosen field of profession. That’s why it is one of the heaviest responsibilities one’s organizations carry in.  They are also responsible in making proper and right decisions among the members of its circle regarding for what is good of the majority. Furthermore, organization also is responsible in looking for what the employees acted upon, and to stop any unusual, illegal actions made by the any members of the circle, like its suppliers and business partners. One’s actions might affect the entire business.
                                                                                                       
Case # 3: Manufactures Compete on Green Computing

1. How have green computing efforts lowered the total cost of computer ownership?
          Green computing, the study and practice of efficient and eco-friendly computing resources, is now under the attention of not only environmental organizations, but also businesses from other industries. In recent years, companies in the computer industry have come to realize that going green is in their best interest, both in terms of public relations and reduced costs. This article will take a look at several green initiatives currently under way in the computer industry, as well as issues that have been raised regarding these initiatives.
          Total Cost of Ownership (TCO) represents how much it actually costs to own a PC. The TCO includes parameters such as the original cost of the computer and software, hardware and software upgrades, maintenance, support and training. Most estimates place the TCO at about 3 to 4 times the actual purchase cost of the PC. In a Multi workstations environment, these costs quickly add up to high expenses. Green computing efforts lowered the total cost of computer ownership, I think, in a manner when user try to buy the components on their own and attempt to assemble its parts on their own. When the parts and components lowered its price, possibility is individual who have knowledge in assembling a computer might be a advantage for him or her.


2 Which approach can yield greater benefits—building greener computers or implementing programs that change users’ behavior so that they operate their computers in a more responsible manner? Explain your response.

        Well, if I had a chance to choose, I prefer to go with implementing programs that change user’s behavior so that they operate their computers in a more responsible manner. Building greener computers made done by the manufacturers is good. But I do believe that user’s knowledge and behavior would greatly affect the success of the said paradigm. What’s the essence of building green computers by the manufacturers but when it passed to the user’s hand, they have no idea or knowledge about how to take care of it as well as be responsible on using it. And what’s the essence of the best features highlight with green PC’s when user’s behavior tends to threaten it? Users must comprehend the importance of the green PC in preserving our environment, which is our only home. They must also operate their computers in a more responsible manner like turning it off when it no longer used, or maybe the proper manner of disposing waste materials. It is with the manufacturer who initiates the advocacy by making computers greener but it is much successful if the community will cooperate for the greener environment.

3. Do research at the EPEAT Web site and determine which computer manufacturer currently has the best green computing ratings. 

          Green investing site notes Dell’s participation in EPEAT as one of the features of their overall sustainability efforts. Dell is a multinational American-based company dealing with information technology. Dell manufactures sells and supports computers and electronic-related services and products. According to Fortune 500, Dell is ranked as number 41 in largest technological corporations around the world. Dell is committed to reducing carbon dioxide emissions from all global activities by 40 percent by the year 2015. Dell is also the first company in its industry to create a product recycling goal and complete the implementation of it. In June of 2007, Dell set the goal to become the greenest technology goal around the world, which included a zero-carbon initiative. 
 credits to: http://www.greenchipstocks.com/articles/dell-sustainability/1390

Chapter 9: Vignette and Case Study

Vignette: Twitter Emerges a News Source for Iran Protesters

1. Many people question the value of Twitter’s goal of helping people stay connected in real time. Do the events in Iran illustrate the potential value to society of social networking tools such as Twitter? Are there other ways that Twitter and other social networks could be used by people and organizations to add real value?

          It is usual that any social networking site have a common goal and that is, to help people to stay connected with their family, friends and loved ones and to have guaranteed to stay attach in real time. They can also offer services that meet the user’s primary demands. But in what happened to Iran revealed undesirable impact to society of social networking tools such as Twitter, to be exact. Iran Protesters used their Twitter account, using service to share commentary about the ongoing protest and to plan future rallies and against Mahmoud Ahmadinejad, which greatly put into public embarrassment. Social networking site are designed to help people communicate with others, to have social interactions within the society and the freedom to express what he or she feels, of course in a proper manner. Because of what you posted automatically reflect of whom you are; just think before you click as they say. Other ways that Twitter or any social network sites can be used by people or the community to add real value is to support for an idea or cause. To tweet or to post relevant idea or information, or it can be a union of different advocacies, sharing of thoughts, ideas or knowledge in an appropriate conduct. It is true that social networking website capable of putting us into the spotlight but it will somehow bring you into shame.

2. How trustworthy is the information one gleans from social networks such as Twitter?
          When you create or reconfigure a Twitter account, you provide some personal information, such as your name, username, password, and email address. This bunch of information helps you to create your account to interact with friends and to be entertained. But at some point of time your personal information might be used for some inappropriate manner. Can we really extend trust to social networks such as Twitter? Are they trustworthy enough? The Twitter provides some privacy settings to help and to share with its users. These are the Information sharing and Disclosure privacy setting:

Your Consent: We may share or disclose your information with your consent, such as when you use a third party web client or application to access your Twitter account.

Service Providers: We engage certain trusted third parties to perform functions and provide services to us. We may share your personal information with these third parties, but only to the extent necessary to perform these functions and provide such services, and only pursuant to obligations mirroring the protections of this privacy policy.

Law and Harm: We may preserve or disclose your information if we believe that it is reasonably necessary to comply with a law, regulation or legal request; to protect the safety of any person; to address fraud, security or technical issues; or to protect Twitter's rights or property.

Business Transfers: In the event that Twitter is involved in a bankruptcy, merger, acquisition, reorganization or sale of assets, your information may be sold or transferred as part of that transaction. The promises in this privacy policy will apply to your information as transferred to the new entity.

Non-Private or Non-Personal Information: We may share or disclose your non-private, aggregated or otherwise non-personal information, such as your public Tweets or the number of users who clicked on a particular link (even if only one did).

Scandals and issues are hard to avoid when we talk about technologies, because in a world were human minds innovate, highly competition exist.



Case Study # 3: Social Networking Disaster for Domino's

1. Some observers believe that if an organization does not respond to an attack on its brand within the first 24 hours, then the damage has been done—lack of management response is judged as an admission of guilt. Others feel that some time is required to gather facts and figure out what happened before responding. With the advantage of 20/20 hindsight, how might Domino’s have reacted more effectively?



          Here comes a famous saying that ‘prevention is better that cure’. In relate to what happened in Domino’s fast-food business they experienced very alarming scenario in regards with food safety. Employees tend to play like a child and what’s funny they take video about what they did in the food and then uploaded. This kind of immature activity brings Domino into embarrassment. Domino’s executives initially take no action, hoping that the hoopla over the video soon subsides. But it caused viral scandal through social networking web sites like Twitter, the video uploaded to YouTube also received abundant comments and critics about the unmannered actions shown by the employees. It is obvious that the Domino didn’t take rapid actions to solve the issues which are sooner caused trouble to their business. As soon as they know the specific problem occurred, they might take appropriate actions as soon as possible to avoid furthermore problems. Domino’s have reacted more effectively when they earlier recognize the problem. They might tell and warn the employees to delete the video that might attract gossip and issues about their business and may lead to breakdown of Domino. It is truly much convenient and applicable that prevention is very much better than cure.           

2. Do you find it unusual that Domino’s response was primarily through the online media rather than the usual printed press releases? Does this seem an effective and appropriate way to respond under these circumstances? Why or why not? Does Domino’s use of the online media set a precedent for others to follow in the future?

          Domino’s claim they did not want to attract even more people to the video by issuing a formal press release to the news media. By what they said, it is apparent that it’s unusual to response primarily in online media rather than usual printed press release. In my opinion, it’s their way to avoid further shame and embarrassment. When we say online media response it is usually the people who are actively present and have an access to Internet might involve in the issue, and the other people don’t have the opportunity to access Internet might possibly don’t have knowledge about the existing problem. When Domino’s release a response through printed press or news media, it is more prone to attract further people, who have television or read news now and then, making them much more put into the spotlight. It is unusual but I think it may take advantage from their side to avoid receiving some critics and unwanted response from the people.
          I think, releasing a response in online media and making effective and appropriate way to face circumstances, is somehow incapable and weak way to respond and reach the public. When it is released to the news media, it might help the people to be aware for their protection also, but releasing a response through news media brings also disadvantage to Domino. Their rivals might use the opportunity to gain huge of customers that Domino’s lose.
          Domino’s use of the online media might somehow set a precedent for others to follow in the future, when the guilty parties don’t want to put into shame and disclose their carelessness in the public. When you are not guilty of doing such things, you’re not afraid to be revealed to the public.

3. Identify three lessons that other companies could learn from Domino’s experience.


          Be mature enough, Employees must put into their minds that their workplace is not a playground and they are no longer a child to play around. It is very much important to observe proper behavior and manner wherever you are especially when you are in a working place where public advantage must be out into concern.
          Place things in an appropriate manner, taking videos with inappropriate content is not useful indeed, so why taking videos when it is destructive then? And what’s worse when uploading it into a site when many people can access it. It only manifest that you’re not trusted enough to put things in an appropriate manner. You must consider the people that might be affected before doing such meaningless actions.
          Take immediate actions, when you think that it is needed to take actions before it’s too late, why not doing it early to avoid some rapid outcomes. When your business is concern, it is require to take some instant response before it’s too late and you can’t do nothing but helpless.

Chapter 8: Vignette and Case Study

Vignette: Western Cape Striving to Eliminate the Digital Divide     

1. How important is access to ICT in children’s education?

          Broadly speaking, the difference is not necessarily determined by the access to the Internet, but by access to ICT (Information and Communications Technologies) and to Media that the different segments of society can use. With regards to the Internet, the access is only one aspect, other factors such as the quality of connection and related services should be considered. ICT is playing an increasing role in people's lives. ICT is also becoming an important aspect in the employment sector and a tool for enabling citizen participation and social inclusion as more services, products and information becomes accessible by electronic means. Access to ICT is very much important in children’s education it is because it the best possible way to make them get interested and determine to know. ICT provides the easy access to Internet in which in just one click and one enter it can help the children to understand and comprehend the things and ideas that might refused them. Schools are using ICT to enhance and add a new dimension to the learning process, and also to increase communication between the home and school. Some schools use their own web sites to make learning resources available on line. With the functionality and capability of ICT, some schools are also able to provide parents and pupils with data relating to attainment, attendance or other school/community-related information. Also, it is more easy and convenient for the children to use ICT regarding research, or making assignments by just typing the terms instead of scanning all the pages of a very thick book. The increasing relevance of ICT in education, and in wider aspects of social life, has lead to schools striving to ensure that all pupils become capable in its use and application in a number of situations.

2. What are the barriers that stand in the way of universal access to ICT for everyone who wants it?
Socio-economic and socio-personal factors
Barriers to the adoption and use of ICTs by socially excluded groups are usually correlated with socio-economic factors. Commonly identified barriers preventing the adoption and use of ICTs are lack of low-income, low levels of education, low skilled jobs, unemployment and lack of technological or computing skills. All of these factors are linked to, or are consequences of, socio-economic factors.
The percentage of households with home access to the Internet by gross income deciles group
Other factors hindering the adoption and use of ICTs are life characteristics such as age, gender, disability and ethnicity. Some of these are often related to socially excluded groups, but they are not necessarily socio-economic factors. All the factors mentioned above have been widely researched and are acknowledged as the core barriers to the adoption and use of ICT.

Socio-personal factors
Our analysis has shown that Socio-personal factors are also important barriers to the adoption of ICTs by socially excluded groups. Socio-personal barriers encompass attitudinal and behavioral factors.  These include issues such as levels of interest, awareness, understanding and acceptance of ICTs.



Case Study # 3: Technological Advances Create Digital Divide in Health Care

1. Can you provide examples that either refute or confirm the idea that a gap exists between the kinds of healthcare services available to the wealthy and the poor in the United States?


          Inequality in economic resources is a natural but not altogether attractive feature of a free society. As health care becomes an ever larger share of the economy, we will have no choice but to struggle with the questions of how far we should allow such inequality to extend and what restrictions on our liberty we should endure in the name of fairness. At its root, the lack of health care for all in America is fundamentally a moral issue. The United States is the only industrialized nation that does not have some form of universal health care defined as a basic guarantee of health care to all of its citizens. While other countries have declared health care to be a basic right, the United States treats health care as a privilege, only available to those who can afford it... Americans purport to believe in equal opportunity. Yet, in the current situation, those who do not have health care are at risk for financial ruin and poorer health, both of which disadvantage them in society and thereby do not give them equal opportunity.


2. Should healthcare organizations make major investments in telemedicine to provide improved services that only the wealthy can afford?


          There is nothing wrong to invest in healthcare telemedicine advances, when it indeed helps patients or people to avail convenient and easy to use technologies to make their health stable and away from risks. But when it comes to discussion when it is only available to the wealthy people, it’s the time that I disagree with the said concern. Healthcare is not a privilege to the poor and a favored to the rich ones. Healthcare is not only for the people who can afford but also to those who can least afford. When technological advances accompany discriminations between poor and elite people, what’s the essence of bringing it to implementation? And what is the bottom line in the existence of the said technology, when first and foremost it was made to help people, but it is really to the people or to those who can only afford? I strongly agree that you or your country deserves to be called ahead in terms of technology advancement if and only if, no discrimination between poor and elite people present in the society.

3. What are the drawbacks of telemedicine? What situations might not lend themselves to telemedicine solutions? 

          The possible hindrance that might occur in telemedicine is that few people can only avail or afford it, because almost people are not that rich to avail the product or services. Possible drawbacks also can be the lack of knowledge to use such devices when it was once passed to the patient or individuals hands. The possible disadvantage of telemedicine is when come to the point of a breakdown in the relationship between health professional and patient; a breakdown in the relationship between health professionals; issues concerning the quality of health information; and organizational and bureaucratic difficulties.If telemedicine advance technology failed or guilty to have error, patients might not lend themselves to telemedicine solutions and maybe probably go back to what is usual way usage of healthcare.

Chapter 7: Vignette and Case Study

Vignette: Boeing Dreamliner Faces a Few Bumps in the Road
    1.    Is this example of software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers unusual, or is it a common occurrence?
          For me, software problems holding up the introduction of a major new product and impacting a firm’s customers and suppliers commonly occur. It is not unusual to a software program to fail and come up with some major errors which may definitely affect the introduction of other products as whole.  As how the success of the software program rapidly spread and expand is as very much alike on how the failure instantly arises and automatically receive astonish critics. That’s why it’s not strange to hear or read such events or issues because as expected, developing a software program does not necessarily means perfect at all, it must and it should go through an roller coaster of up’s and downs to appreciate its value.
         
 2.  What can organizations do to reduce the negative consequences of software development problems in the production of their products and the operation of their business processes and facilities?

          Operations management is a multi-disciplinary field that focuses on managing all aspects of an organization's operations. "The typical organization consists of the integration of many different functions. Operations management focuses on the function of providing the product or service. It is concerned with the planning and controlling of all activities necessary for the provision of the firm's product or service.

Designing the system, begins with product development. Product development involves determining the characteristics and features of the good (or service if engaged in a service-oriented industry) to be sold. It should begin with an assessment of customer needs and eventually grow into a detailed product design. The facilities and equipment that will produce the product, as well as the information systems needed to monitor and control performance, are part of this system design process. In fact, manufacturing process decisions are integral to a system's ultimate success or failure.

Planning the system, describes how management expects to utilize the existing resource base created as a result of the production system design. One of the outcomes of this planning process may be to change the system design to cope with environmental changes. For example, management may decide to increase or decrease capacity to cope with changing demand, or rearrange layout to enhance efficiency.

Managing the system, involves working with people to encourage participation and improve organizational performance. Participative management and teamwork are an essential part of successful operations, as are leadership, training, and culture. In addition, material management and quality are two key areas of concern.


Case Study # 3: Patriot Missile Failure


1. With the benefit of hindsight, what steps could have been taken during development of the Patriot software to avoid the problems that led to the loss of life? Do you think these steps would have improved the Patriot’s effectiveness enough to make it obvious that the missile was a strong deterrent against the Scud? Why or why not?

          On February 25, 1991 a Patriot missile battery failed to intercept an incoming Scud missile aimed at an army barracks in Dhahran, Saudi Arabia.  When the Scud missile hit the barracks 28 soldiers lost their lives and 99 were wounded.  This was the largest single loss of life among coalition forces in that war.  The point we make here is that errors in design and implementation of hardware and software systems can, and often do, carry a human cost.  Good design is not just an academic issue – it is also a human issue. Although the incoming missile was initially detected, on the subsequent attempts at confirmation it was not found to be within the predicted location cone.  Therefore the incoming missile was not tracked and the Patriot missile was not fired. As so often is the case, the software component is encased within a system of hardware components which, in turn, is embedded within a much larger system of personnel and situational considerations.  Because of this a lot of factors contributed to the final outcome. As we dig deep for the root cause of the problem, we note the similarity to our analysis of the Ariane 5 rocket explosion.  In both cases a pre-existing system was adapted to a new circumstance.  But the new rocket design turned out to be so different as to require a deeper analysis of the entire system which was not carried out.  In particular, a new round of testing should have been specified.



2. What ethical decisions do you think the U.S. military made in choosing to deploy the Patriot missile to Israel and Saudi Arabia and in reporting the effectiveness of the Patriot system?
                                                                
           One must first consider the welfare of everybody. When it does tend to be too serious and dangerous to the public, it must be very careful in dealing with such things. It is not just software, it can cause harm to the majority when it experience failure and error in the program. Before deploying it to other places, they might consider the effects, the possible outcomes, and the danger or harm that it might bring to the people. Also, when reporting the effectiveness of the Patriot system, just pretty sure that it free from hazard and troublesome situation. People might give trust and good enough to believe that it was safe, and then accident happened, the failure comes, and greatly damage some people.

 3. What key lessons from this example of safety-critical software development could be applied to the development of business information system software?

      Safety-critical software is any kind of hazardous software, including software that directly contributes to a hazard or controls it. Lessons must be there has to be a project management plan for the development of safety-critical software. This plan should outline all the work that is being done so as to make for the best performance of the safety-critical software. This includes various aspects such as the project's organizational structure and interfaces. The safety plan -- another important aspect of project management for safety-critical software development -- provides an outline of the various analyses to be done on the safety-critical software during its development. It also provides a schedule for performing such analyses.
                                                                                                        

Chapter 6: Vignette and Case Study

Vignette: RIAA Fights Music Piracy

1. Is the RIAA’s strong stand on copyright infringement helping or hurting the music recording industry?
             The RIAA justifies its strong antipiracy efforts as means of both protecting the ability of the recording industry to invest in new artists and new music, and giving legitimate online music sharing services a chance to be successful. That’s why RIAA’s strong stand on copyright infringement was very helpful to the music recording industry. They are so rigid about copyright infringement issues because even a small carelessness leads to breakdown of the industry. It also helps to change the habit of some of us, to plagiarize materials that are illegitimate. Also, when a strong stand brings to success it maybe probably increases the gains of the said industry. But it may also take to the negative side, people who are fun of copying or downloading music through the Internet might get discouraged and no longer interested in music because if the only way to have it, is to pay for it. 

2. Could an ISP’s implementation and enforcement of the RIAA’s multitier strategy have a negative impact on the ISP?
          Yes, well definitely yes. I think so, when ISP’s implement and reinforce the RIAA’s multitier strategy bear a negative impact on their part. It is stated to the RIAA program that the RIAA will alert participating Internet service providers to what it believes to be illegal downloading activities by ISP customers. Also, the ISP will either forward RIAA copyright infringement notices to its subscribers or notify its customers about the notices and ask them to cease and desist. As well as the ISP can take a series of escalating sanctions against repeat offenders, ranging from slowing down the subscriber’s network speed to terminating service. Furthermore, the RIAA reserves the right to sue flagrant copyright offenders. Because in this multitier strategy articulate in their program, the ISP greatly affected by this movement. When these strategies put into actions, customers might be afraid of doing that might harm them. The visitors of the ISP might decrease in number which is not a good idea.  


Case Study # 3: Lotus v. Borland

1. Go to your school’s computer lab or a PC software store and experiment with current versions of any two of the Quattro, Excel, or Lotus 1-2-3 spreadsheet programs. Write a brief paragraph summarizing the similarities and differences in the “look and feel” of these two programs.


The General Differences:
       Select first, and then choose a command     In Lotus 1-2-3, you choose a command and then specify a range that the command will affect. In Excel, you select the cell, range, or object you want to work with and then choose a command to perform an action. For example, if you want to format a range of cells, select the cells and then click Cells on the Format menu.
         Keys for moving around a worksheet     The navigation keys you use to move around a worksheet differ between Excel and Lotus 1-2-3. For example, if you press the HOME key in Lotus 1-2-3, the cell in the upper-left corner of the worksheet is selected; in Excel, the first cell of the current row is selected. You can change the navigation keys in Excel to move around the worksheet in the same way as Lotus 1-2-3.
        Parsing text from one column to several     In Lotus 1-2-3, you use the Parse command to separate text strings in one column across several columns. When you open a text file in Excel, the Text Import Wizard will assist you in parsing the data into columns. If you need to parse data in one column across several columns on the worksheet, use the Text to Columns command (Data menu).
            Macros     Excel 2000 and later versions of Excel do not run Lotus 1-2-3 macros. Excel displays workbooks that contain worksheets in a window. By default, the menu bar, the formula bar, and the Standard and Formatting toolbar are displayed at the top of the window. At the bottom of the window, the status bar displays different indicators about the current working environment.
The General Similarities:
Many Lotus 1-2-3 functions have Microsoft Excel equivalents. However, Microsoft Excel uses different calculation rules than Lotus 1-2-3 when evaluating text in formulas, certain database criteria, and the value of certain logical operators.

2. The courts took several years to reverse their initial decision and rule in favor of Borland. What impact did this delay have on the software industry? How might things have been different if Borland had received an initial favorable ruling?


         The delay causes tremendous impact on the software industry. Some other firm might be confused and doubt regarding on the delay. It is once said that Borland was guilty in infringement against the Lotus 1-2-3, but later on U.S district court changed their side in favor to Borland and took several years. The impact about this to software industry that it might confuse them to what is really the proper and acceptable principle in terms of copyright infringement. If Borland had received earlier an initial favorable ruling, they might continue working with their spreadsheet program, Quattro. They might also still in the spreadsheet business. They may also continue in spreading the program made by them and be a successful unlike Lotus 1-2-3.

3. Assume that you are the manager of Borland’s software development. With the benefit of hindsight, what different decisions would you have made about Quattro?


          If ever I would become the manager of Borland’s software development in the near future, I might have different decisions after recognizing the realities about Quattro issues. It can be the used of different techniques, form or ideas that far away from what Lotus 1-2-3 implied. It is still a spreadsheet program but I make pretty sure that it won’t let attract any unethical issues. Borland can still sell their products without the features that they probably copy or not from Lotus. So, why including the features if it is only attract attention from the law officials. Making and developing software is a long process, it takes a lot of effort, patience and time to make it successful. It is not nice to copy the idea from others; it is still significant to be unique original, from this you may attract users because it might new and amazing to them.

Chapter 5: Vignette and Case Study

Vignette: Sexting

1. Does sexting represent a form of expression that is protected by the First Amendment?
          For generation upon generation, young people and adults have been exchanging sexually suggestive and explicit letters, messages and other materials, so sexting shouldn't come as a big surprise. On the other hand, the ease with which photos and videos can be propagated is a concern. A photo shared between two people can quickly become a viral phenomenon. Well, here comes the so called The First Amendment stated the protection of American’s rights to freedom of religion and freedom of expression.  But here’s the question, does sexting represent a form of expression that is protected by the First Amendment? I don’t think so. We have all the rights to express our very own selves, to speak out and voice out what our standing in the specific situation. But besides of having that right, we also have the responsibility to express it well in an educated manner. Sexting is truly a shame scandal which is clearly not represents a form of expression. Because I do believe that freedom of expression is a very consecrated act.

2. What can be done to protect people from the dangers of sexting while still safeguarding our First Amendment rights?
          In every actions we do, there is always a corresponding consequences comes to follow. For me, the better way to do to protect people from the dangers of sexting is to spread the knowledge of what is the general and concrete definition of freedom of expression. We cannot say that if we have the power and will, the freedom to express our self in any dishonorable manner its okay or it’s valid? No! Every individual must grasp the knowledge of what it truly the essence of freedom of expression. Individual must also be vigilant and responsible in taking some actions that might put her or him into the stage of shame. There are no such successful actions if the people itself didn’t cooperate to make it successful. When people know to distinguish the right and wrong regarding of how to express his or herself, there is no such thing as dilemma in safeguarding the First Amendment rights. A change always starts to one’s individual with willingness, and everyone follows.


Case Study # 3: The Electronic Frontier Foundation (EFF)

1. Visit the EFF Web site at www.eff.org and develop a list of its current “hot” issues. Research one EFF issue that interests you, and write a brief paper summarizing EFF’s position. Discuss whether you support this position and why.

“Consumer Reports: Facebook privacy problems are on the rise”

The social network's history of privacy and security oversteps echo complaints from other digital rights advocates including the American Civil Liberties Union and the Electronic Frontier Foundation that Facebook fixes issues only after it's forced into the spotlight or after authorities approach the social network. Consumer Reports released its annual report on Internet privacy and security Thursday, placing Facebook front and center. Issues covered by the influential consumer watchdog group included updates on data leaks, hacks, scams, and the like, while featuring a separate report focusing entirely on Facebook and how the social network deals with privacy, security and the very personal information. Users can also do more to protect their privacy and security on Facebook, Consumer Reports noted, and offered the following tips.

Think before you type. Even if you delete an account which takes Facebook about a month), some info can remain in Facebook’s computers for up to 90 days.
Regularly check your exposure. Each month, check out how your page looks to others. 
Review individual privacy settings if necessary. Protect basic information. Set the audience for profile items, such as your town or employer. And remember: Sharing info with “friends of friends” could expose it to tens of thousands.
Know what you can’t protect. Your name and profile picture are public. To protect your identity, don’t use a photo or use one that doesn’t show your face.
“Unpublic” your wall. Set the audience for all previous wall posts to just friends. 
Turn off Tag Suggest. If you’d rather not have Facebook automatically recognize your face in photos, disable that feature in your privacy settings. The information will be deleted.
Block apps and sites that snoop. Unless you intercede, friends can share personal information about you with apps. To block that, use controls to limit the info apps can see.
Keep wall posts from friends. You don’t have to share every wall post with every friend. You can also keep certain people from viewing specific items in your profile.
When all else fails, deactivate. When you deactivate your account, Facebook retains your profile data, but the account is made temporarily inaccessible. Deleting an account, on the other hand, makes it inaccessible to you forever.

It’s so hard to face this kind of problems, where you can do nothing but helpless. That’s why don’t just disregard any important matters when it comes to your personal and private data. Don’t just play and enjoy it as if nothing is threatening, be aware.


2. What reasons might a firm give for joining and supporting EFF?
          As new aspects of society -- and whole new societies -- are built online, the EFF's mission is to protect that liberty. The payoff, if it succeeds, is tremendous. A huge but increase in economic prosperity and an incalculable dividend of personal freedom. It's like being an early stage investor in the business world. You want to get in on the ground floor, and leverage a relatively small investment into a big social success. If you want to change the world for the better, the EFF has been created at the exact right time in history and is working on the exact right pressure points to make those changes.

3. The vice president of public affairs for your midsized telecommunications equipment company has suggested that the firm donate $10,000 in equipment and services to EFF and become a corporate sponsor. The CFO has asked if you, the CIO, support this action. What would you say?

          For me, there is nothing wrong about donating a certain amount to EFF. It is because the EFF goal is to protect fundamental civil liberties relating to the use of technology, including free speech, privacy, innovation, and consumer rights. They have been building a better community to every individual. So, why not give them some little support that some are willing to give. You’re not only helping the EFF to do their intended advocacy but you are also helping the people that might benefit from what you've been given.


Wednesday, May 2, 2012

Chapter 4: Vignette and Case Study

Vignette: Privacy concerns abound with new IRS systems

1.   What information about you is being held, who is holding it, and what is this information being used for?

          As far as I concerned, there is no such information about me that being held. But there are cases that when I make sign up process in any online web applications like signing in specific social networking sites, and there are a lot of sites regarding that, there is a feeling of uncomfortable. Uncomfortable in a sense that I’m giving my personal information without knowing who will receive it, what they can do about it, or how they can hold and protect it.


2. What measures are being taken to safeguard this information and what happens if it is inadvertently or deliberately stolen?

        One must be responsible enough to safeguard confidential or personal information. We have the right to make it private and secret. One must know how to protect it and hold it properly for a good relationship to the owner of the data. One must not sacrifice one’s personal information just to impersonate something, or one must not sell the information to others just to have money. It is not yours it is someone’s life which you unconsciously putting into battle. And if something happens that it was deliberately stolen, it is important to report it just for others to be aware that they are not the one who make currently actions using your personal information.


Case Study # 3: Is Google Watching You?

    1.    How does Google’s business model use personal data?

        Google business model use personal data by simply having the aim to know what the user’s preferences and by that they can gain from customers. By this way, Google can target their client’s advertisements to the very specific aspect like age, location, profession, hobbies or interest. Google collects search information for advertising purposes; it also stores this information in Google database. Google offers a lot of free applications like email, publishing, blogging, document sharing, video sharing, online calendar, web page creation, web photo albums, and many others. First and perhaps foremost is the concern generated by the wealth of personal information Google is able to assemble using a user’s login identity. To use Google products, users must first create a Google login through which they provide an email address. And by that, your personal information collected and stored in Google database.

    2.    What do you think are the major privacy concerns raised by Google’s business model and applications?

      For me, the major privacy concerning Google’s business model and applications is that Google places cookies on the user’s computer, in order for them to retrieve data on the user or gain more information about a user’s identity before he or she has logged in. And what’s more surprising that they are the first company extends the expiration of its cookies far into the future. The company has its expiration date of 2038, hoping to track user preferences over time. And many complained about this kind of functionality Google responsible. And then Google suddenly set its expiration date after two years it sounds good compare to 2038 until people realized that any time a user visits a Google site, the cookie is automatically renewed for two years, which sounds they are making as fool. And I think it was the major privacy concerns raised by Google Company because they can gain access more about our confidential information which violate and put into risk our own personal privacy.  And also there are possibilities that Google will share the information it collects with other sources. This may possibly cause a serious animosity among the user privacy and the Google Company.

    3.  Do you think Google has taken adequate measures to protect its user’s privacy? Explain you answer.

        I think, in the world of highly competitive people it is not an issue or a matter of who is the one who really fair enough to treat their business, somehow others tend to do what they think is right just to enhance and made their business productive. They may know what is generally wrong but forced to do it instead, or maybe they forced to make hard decisions just to save things and sacrifice the other. What my point here is that, I don’t believe that there is company or business that perfectly arrives. That everything was perfectly happened. Because every business company come up with problems which may lead them to do what is right or to do what is wrong. In the case of Google privacy I could possibly say that yes, they taken adequate measures to protect its user’s privacy just like the issue with the Department of Justice. DOJ did attempt to gain access to two months’ worth of Google’s data as part of its attempt to fight child pornography on the web but Google refused to cooperate. It is because Google pledged to keep its user’s personal data private as well as to protect the trust of its users. DOJ allowed to access part of Google’s index of sites, but preventing it from accessing search-term data.