Lunes, Marso 2, 2015

Angelie Flor M. Yamson BSIT-III
Chapter 5 Case Study

1. Your friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He asked you dedsign a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark. However, much of the information in the Web page will include discussion of his personal success in various traithlons and marathons in which he has competed. Many of these events has corporate sponsors and carry their own trademark. He has asked you if there are any potentails trademark issues with his marketing plans. What would you do?
Answer:
Yes, there are potentials trademark issues to that different company. Because each company has there own trademark infringement. If I given a chance to design it for my friend I will include his success and his accomplishment and I will never include those trademarks from other different sponsor or company because it is the cause of problem.
2. Because of the amount of the expense, your company’s CFO had to approve a $500,000 purchase order for hardware and software needed to upgrade the service used to store data for the Product Development Department. Everyone in the department had expected an automatic approval, and they were disappointed when the purchse order request was turned down. Management said that the business benefits of the expenditure were not clear. Realizing that she needs to develop a more solid business case for the order, the vice president of Product Development has come to you for help. Can you help her identify arguments related to protecting intellectual propertythat might strengthen the business case for this expenditure?
Answer:
For developing a more strong business is must be a team and must be also united to protect the intellectual property because it is very important in the whole world trade.

3. You are interviewing for the role of human resources manager for a large software developer. Over the last year, the firm has lost a number of high-level executives who left the firm to go to work for competitors. During the course of your interview, you are asked what measures you would put in place to reduce the potential loss of trade secret from executives leaving the firm. How would you respond?
Answer:
After interviewing, it would not be spread from other companies for safety and for improvement of others because if other company know what you interviewed and they apply those information you get therefore they improve. So it’s better to be not spreaded. And explain those values of the trade secret. It is all about a trade secret.



Chapter 6 Case Study


1. A former high school classmate of yours who has returned to china emails you that he has been offered a part-time job monitoring a Chinese website and posting comments favorable to the government. How would you respond?
Answer:
I ask her/him to make it sure first before you go it, if it is legal or illegal website. Because as of now many people victims about social media and the comments is just a freedom of speech it is not sure, it is expressing our freedom of speech. And if he/she likes the job I will tell her/him that you should really know first what are those characteristics you stand for and be aware those happen in social media such as libel, freedom of speech and others.
2. Your 15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very reavealing photo attachment he just received in a text message from his 14 year old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
Answer:
I will tell and explain him that you are both too young to have that relationship, which you are not in age of maturity you are still protecting on pornography. And I’ll explain him with a care and love that it is a bad thing when do it because it is a private to discuss about sexting, for you to know that it is not a good thing to play.

3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to treathen negative posters with a libel lawsuit unless the y removes their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say tp your friend about her idea?

Answer:
I agree with the idea of my friend of that monitoring the PR, because it is reducing the libel lawsuit and a libel. I will ask her to immediately give an action to those involves in libel crime.


4.  You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the childrens Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?
Answer:
There is some website that you can’t open or you are not allowed to open. I will implement and orient in order to understand the internet filtering for our own good. Internet is not all the time we can get our source of our learning. Because the one who create a software, website and others are human like us, they’ll share their knowledge through creating those I mentioned. And it will make us our source.
5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
Answers:
Of course I'm getting hurt and I will report to the head of school to located who is that damn sender. Or else I delete that email and forget what they send and I will put into my mind that they are insecure to me and I really don’t care what they say. What I'm going to do is focus on my study and stop thinking those issues that can turn me down.




Angelie Flor M. Yamson BSIT-III
Chapter 5 Case Study

1. Your friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He asked you dedsign a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark. However, much of the information in the Web page will include discussion of his personal success in various traithlons and marathons in which he has competed. Many of these events has corporate sponsors and carry their own trademark. He has asked you if there are any potentails trademark issues with his marketing plans. What would you do?
Answer:
Yes, there are potentials trademark issues to that different company. Because each company has there own trademark infringement. If I given a chance to design it for my friend I will include his success and his accomplishment and I will never include those trademarks from other different sponsor or company because it is the cause of problem.
2. Because of the amount of the expense, your company’s CFO had to approve a $500,000 purchase order for hardware and software needed to upgrade the service used to store data for the Product Development Department. Everyone in the department had expected an automatic approval, and they were disappointed when the purchse order request was turned down. Management said that the business benefits of the expenditure were not clear. Realizing that she needs to develop a more solid business case for the order, the vice president of Product Development has come to you for help. Can you help her identify arguments related to protecting intellectual propertythat might strengthen the business case for this expenditure?
Answer:
For developing a more strong business is must be a team and must be also united to protect the intellectual property because it is very important in the whole world trade.

3. You are interviewing for the role of human resources manager for a large software developer. Over the last year, the firm has lost a number of high-level executives who left the firm to go to work for competitors. During the course of your interview, you are asked what measures you would put in place to reduce the potential loss of trade secret from executives leaving the firm. How would you respond?
Answer:
After interviewing, it would not be spread from other companies for safety and for improvement of others because if other company know what you interviewed and they apply those information you get therefore they improve. So it’s better to be not spreaded. And explain those values of the trade secret. It is all about a trade secret.



Chapter 6 Case Study


1. A former high school classmate of yours who has returned to china emails you that he has been offered a part-time job monitoring a Chinese website and posting comments favorable to the government. How would you respond?
Answer:
I ask her/him to make it sure first before you go it, if it is legal or illegal website. Because as of now many people victims about social media and the comments is just a freedom of speech it is not sure, it is expressing our freedom of speech. And if he/she likes the job I will tell her/him that you should really know first what are those characteristics you stand for and be aware those happen in social media such as libel, freedom of speech and others.
2. Your 15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very reavealing photo attachment he just received in a text message from his 14 year old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
Answer:
I will tell and explain him that you are both too young to have that relationship, which you are not in age of maturity you are still protecting on pornography. And I’ll explain him with a care and love that it is a bad thing when do it because it is a private to discuss about sexting, for you to know that it is not a good thing to play.

3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to treathen negative posters with a libel lawsuit unless the y removes their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say tp your friend about her idea?

Answer:
I agree with the idea of my friend of that monitoring the PR, because it is reducing the libel lawsuit and a libel. I will ask her to immediately give an action to those involves in libel crime.


4.  You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the childrens Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?
Answer:
There is some website that you can’t open or you are not allowed to open. I will implement and orient in order to understand the internet filtering for our own good. Internet is not all the time we can get our source of our learning. Because the one who create a software, website and others are human like us, they’ll share their knowledge through creating those I mentioned. And it will make us our source.
5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
Answers:
Of course I'm getting hurt and I will report to the head of school to located who is that damn sender. Or else I delete that email and forget what they send and I will put into my mind that they are insecure to me and I really don’t care what they say. What I'm going to do is focus on my study and stop thinking those issues that can turn me down.




Name: Angelie Flor M. Yamson BSIT-III

Chapter 4 Case Study

1.       Your friend is considering using an online service to identify people with compatible personalities and attractive physical features who would be interesting to date. Your friend must first submit some basic personal information then complete a five-page personality survey, and finally provide several recent photos. Would you advise your friend to do this? Why or why not?
 Answer:
 Of course No, because this idea might not be safe or good for the security of my friend. I could say that it’s not secure enough because going into a date must be ask or planned personally by a group or the person involve with it. By the situation, I rather find a guy who is interested with my friend than letting her engage into an online service which is basically unsafe for a reason that he or she didn’t know the background of such person that my friend is going out with. As we all knew that there are lot of online scam are spreading today which results in fooling a person and the worst is into a crime. I don’t want to put my friends in danger. I care about them and I disagree online services in identifying people who are interested to her or him.

2. You are a recent college graduate with only a year of experience with your employer. You were recently promoted to manager of email services. You are quite surprised to receive a phone call at home on a Saturday from the Chief Financial Officer of the firm asking that you immediately delete all email from all email servers, including the achieve and back-up servers that are older than six months. He states that the reason for this request is that there have been an increasing number of complaints about the slowness of email services. In addition, he says he is concerned about the cost of storing so much email. This does not sound right to you because you have taken several measures that have actually speeded up email services. You recall a brief paragraph in the paper last week that stated several suppliers were upset about what they called “prince fixing” among the companies in you industry. What do you say to the Chief Financial Officer?
Answer:
Just because he is my Chief Financial Officer I will respect his request to delete all email from all email services. And I also appreciate his concerned about that costing of storing that email. But before that I ask first a permission to keep a copy for future references before deleting it. Because what if someone look for a certain email that one of the older.  

3. You have 15 years of experience in sales and marketing with three different organizations. You currently hold a middle management position and have been approach by a headhunter to make a move to a company seeking a chief privacy officer. The headhunter claims the position would represent a good move for you in your career path and lead to an eventual vice president of marketing position. You are not sure about the exact responsibilities of the CPO position or what authority the person in this position would have at this particular company. How would you go about evaluating this opportunity to determine if it actually is a good career move or a dead end?
Answer:
                In my 15 years of experience in sales and marketing is of course I want to promote or improve my position. But before receiving or accepting that position given to me, is I will evaluate first if it is good to me, what are those responsibilities, if there are benefits or what are those benefits. And if I deserve it, I will accept and I can say that it is the start of my good career.

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
                The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?
                Answer:
                I think there is a problem regarding that data to provide performance feedback that could result in pay increase or termination. But it’s good that there is a performance feedback because it can help to you to know where your time to adjust is. The problem is many data uses and too much data are make slowness. And to avoid this is you provide performance feedback in just a week, month, or year.

5. You have been asked to help developed  a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database,which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?
                Answer:

                I will develop a company policy that the unauthorized cant access just likes people who are not in that certain company. And make a customer database that can store more than 1.5 millions of records that the process is fast. And if ever the process is slow because of too much records, sort it with by letter, month or by year. Just databases your policy in order to access or view quickly. 


Sabado, Enero 10, 2015

SECOND ACTIVITY



SECOND Activity
1.       There are many ethical issues about which people hold very strong opinions-abortion, gun
Control, and the death penalty, to name a few. If you were a team member on a project with someone whom you knew hold an opinion different from yours on one of these issues, would it affect your ability to work effectively with this person? Why or why not?

Answer: No, because I really don’t care to others opinion. What I’m going to do is to be good on them and to know what I've done if it is wrong or right and if it is wrong I've change. But it’s not my business to the others life and opinion. And be open-minded because every individual has a unique story of their life. 

2.       Identify two important life experiences that helped you define your own personal code of ethics.

Answer: Through observation to the other help me to improve or promote my code of ethics. There are many times that I’m not in the mood and I don’t want someone to bother me. And it help me to defined my code of ethics that I will be patience, relax and don’t get mad to the people who’s not involve.

3.       Do you think that the importance of ethical behavior in business is increasing or decreasing? Defend your position.

Answer: Yes, the business will increase through the code of ethics. Because it help to promote through that goodness, loyal and no bias happened. It increases in goodness ways.

4.       Do you believe that an organization should be able to escape criminal liability for the acts of its employees if it has acted as a responsible corporate citizen, making strong efforts to prevent and detect misconduct in the workplace? Why or why not?

Answer: Yes! I believe that the organization will able to escape any criminal liability for the sake of their organization to be strong and for the safest also. They make a strong effort to avoid any destruction of that organization.

5.       Is it possible for an employee to be successful in the workplace without acting ethically?

Answer: Yes, many people now are successful through doing unethically. They steal lied, cheat and others to make their life in success. Even it is bad they’ll do because for the sake of their forcefulness  But for me, I don’t want to be in success if it is unethically such as stealing, cheating, and lied because it is not a right way to be in success.

6.       Should software piracy within the boundaries of third-world countries be tolerated to allow those countries an opportunity to move into the information age?

Answer: Yes, it is unethically but has a good motive because it helps other such as to download their needs and to share their idea. Even it is unethically but there is goodness.

7.       Is ethics training really just a waste of time that will not change the behavior of employees?

Answer: Yes, it’s wasting the time if the employee does not apply ethics. But some employee learn in an office to be doing or having an ethically. 

Martes, Enero 6, 2015


Why there is no licensure exam for IT professionals.

Information Technology students will become an IT professionals someday.  But some of them did not know why there is no licensure exam. And I’m the one also who did not know that issue about that licensure exam. I think there are many reasons why. As my very own opinion maybe one of the reasons is an IT professional has many field or works to call after studying for four years. They will become an IT instructor, programmer, web development, web designer, call center agent and others that related to technology. Even they did not accomplished there studies in four years as long as, they have an experienced about technology. Unlike to other course that has a particular named to called after finishing or accomplishing their dreams to become a successful. Such as, when your course is education you will become or called as teacher and your field is to teach, when your course is criminology you will be also called or become a police man/woman and other courses too.
Information Technology will just receive a certificate and that certificate given is very useful. You can still receive even you still studying. That certificate such as, NCII, NCIV and other NC (National Certificate) is useful to everywhere because it is national. You just have that certificate if you passed those. Wherever you go if you have that those certificates you will quickly hire.
Without a licensure exam for an IT professional has an advantages. The advantages are if you work that company or what, are you just having an agreement. And then, if ever you have something bad that you’ve done in that company or in your clients you can still work or apply to other companies and dealing with other clients without involving your previous done. Unlike again to other professional that if ever they’ve done badly in their work or job they lost their license. And they will difficulty to find another job or else they did not get a job. But there are also advantages to those professional because if you have that license you have a permanent job.
Information Technology is having a thesis and that thesis is a challenge of individuals of students. And the other course is there challenge is to take the exam for having a license. So, all the courses feel challenge or difficulty stage and that stage is to pass the thesis defend and to other is to pass the board exams. But if you really think it’s just the same because every course has challenge.
The certificate of information Technology Professionals is very useful because it is stand for a license to other course. Without that certificate you can still have a job or you can still work. You just find the client and you were talk about the project. It’s just simple to find the job if you are IT professional unlike to other courses that many requirements to prepare for just an interview and many again requirements when you are already a hired.