Lunes, Marso 2, 2015

Angelie Flor M. Yamson BSIT-III
Chapter 5 Case Study

1. Your friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He asked you dedsign a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark. However, much of the information in the Web page will include discussion of his personal success in various traithlons and marathons in which he has competed. Many of these events has corporate sponsors and carry their own trademark. He has asked you if there are any potentails trademark issues with his marketing plans. What would you do?
Answer:
Yes, there are potentials trademark issues to that different company. Because each company has there own trademark infringement. If I given a chance to design it for my friend I will include his success and his accomplishment and I will never include those trademarks from other different sponsor or company because it is the cause of problem.
2. Because of the amount of the expense, your company’s CFO had to approve a $500,000 purchase order for hardware and software needed to upgrade the service used to store data for the Product Development Department. Everyone in the department had expected an automatic approval, and they were disappointed when the purchse order request was turned down. Management said that the business benefits of the expenditure were not clear. Realizing that she needs to develop a more solid business case for the order, the vice president of Product Development has come to you for help. Can you help her identify arguments related to protecting intellectual propertythat might strengthen the business case for this expenditure?
Answer:
For developing a more strong business is must be a team and must be also united to protect the intellectual property because it is very important in the whole world trade.

3. You are interviewing for the role of human resources manager for a large software developer. Over the last year, the firm has lost a number of high-level executives who left the firm to go to work for competitors. During the course of your interview, you are asked what measures you would put in place to reduce the potential loss of trade secret from executives leaving the firm. How would you respond?
Answer:
After interviewing, it would not be spread from other companies for safety and for improvement of others because if other company know what you interviewed and they apply those information you get therefore they improve. So it’s better to be not spreaded. And explain those values of the trade secret. It is all about a trade secret.



Chapter 6 Case Study


1. A former high school classmate of yours who has returned to china emails you that he has been offered a part-time job monitoring a Chinese website and posting comments favorable to the government. How would you respond?
Answer:
I ask her/him to make it sure first before you go it, if it is legal or illegal website. Because as of now many people victims about social media and the comments is just a freedom of speech it is not sure, it is expressing our freedom of speech. And if he/she likes the job I will tell her/him that you should really know first what are those characteristics you stand for and be aware those happen in social media such as libel, freedom of speech and others.
2. Your 15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very reavealing photo attachment he just received in a text message from his 14 year old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
Answer:
I will tell and explain him that you are both too young to have that relationship, which you are not in age of maturity you are still protecting on pornography. And I’ll explain him with a care and love that it is a bad thing when do it because it is a private to discuss about sexting, for you to know that it is not a good thing to play.

3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to treathen negative posters with a libel lawsuit unless the y removes their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say tp your friend about her idea?

Answer:
I agree with the idea of my friend of that monitoring the PR, because it is reducing the libel lawsuit and a libel. I will ask her to immediately give an action to those involves in libel crime.


4.  You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the childrens Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?
Answer:
There is some website that you can’t open or you are not allowed to open. I will implement and orient in order to understand the internet filtering for our own good. Internet is not all the time we can get our source of our learning. Because the one who create a software, website and others are human like us, they’ll share their knowledge through creating those I mentioned. And it will make us our source.
5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
Answers:
Of course I'm getting hurt and I will report to the head of school to located who is that damn sender. Or else I delete that email and forget what they send and I will put into my mind that they are insecure to me and I really don’t care what they say. What I'm going to do is focus on my study and stop thinking those issues that can turn me down.




Angelie Flor M. Yamson BSIT-III
Chapter 5 Case Study

1. Your friend is two-time winner of the Ironman Arizona Triathlon (2.4-mile swim, 112-mile bike, and 26.2-mile run). He is also a popular and well-known marathon runner throughout the Southwest. He asked you dedsign a Web page to promote the sale of a wide variety of health products, vitamins, food supplements, and clothing targeted at the athletes training to participate in the triathlon. The products will carry his personal trademark. However, much of the information in the Web page will include discussion of his personal success in various traithlons and marathons in which he has competed. Many of these events has corporate sponsors and carry their own trademark. He has asked you if there are any potentails trademark issues with his marketing plans. What would you do?
Answer:
Yes, there are potentials trademark issues to that different company. Because each company has there own trademark infringement. If I given a chance to design it for my friend I will include his success and his accomplishment and I will never include those trademarks from other different sponsor or company because it is the cause of problem.
2. Because of the amount of the expense, your company’s CFO had to approve a $500,000 purchase order for hardware and software needed to upgrade the service used to store data for the Product Development Department. Everyone in the department had expected an automatic approval, and they were disappointed when the purchse order request was turned down. Management said that the business benefits of the expenditure were not clear. Realizing that she needs to develop a more solid business case for the order, the vice president of Product Development has come to you for help. Can you help her identify arguments related to protecting intellectual propertythat might strengthen the business case for this expenditure?
Answer:
For developing a more strong business is must be a team and must be also united to protect the intellectual property because it is very important in the whole world trade.

3. You are interviewing for the role of human resources manager for a large software developer. Over the last year, the firm has lost a number of high-level executives who left the firm to go to work for competitors. During the course of your interview, you are asked what measures you would put in place to reduce the potential loss of trade secret from executives leaving the firm. How would you respond?
Answer:
After interviewing, it would not be spread from other companies for safety and for improvement of others because if other company know what you interviewed and they apply those information you get therefore they improve. So it’s better to be not spreaded. And explain those values of the trade secret. It is all about a trade secret.



Chapter 6 Case Study


1. A former high school classmate of yours who has returned to china emails you that he has been offered a part-time job monitoring a Chinese website and posting comments favorable to the government. How would you respond?
Answer:
I ask her/him to make it sure first before you go it, if it is legal or illegal website. Because as of now many people victims about social media and the comments is just a freedom of speech it is not sure, it is expressing our freedom of speech. And if he/she likes the job I will tell her/him that you should really know first what are those characteristics you stand for and be aware those happen in social media such as libel, freedom of speech and others.
2. Your 15 year old nephew exclaims “Oh wow!” and proceeds to tell you about a very reavealing photo attachment he just received in a text message from his 14 year old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed besides a discussion on sexting?
Answer:
I will tell and explain him that you are both too young to have that relationship, which you are not in age of maturity you are still protecting on pornography. And I’ll explain him with a care and love that it is a bad thing when do it because it is a private to discuss about sexting, for you to know that it is not a good thing to play.

3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to treathen negative posters with a libel lawsuit unless the y removes their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say tp your friend about her idea?

Answer:
I agree with the idea of my friend of that monitoring the PR, because it is reducing the libel lawsuit and a libel. I will ask her to immediately give an action to those involves in libel crime.


4.  You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the childrens Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?
Answer:
There is some website that you can’t open or you are not allowed to open. I will implement and orient in order to understand the internet filtering for our own good. Internet is not all the time we can get our source of our learning. Because the one who create a software, website and others are human like us, they’ll share their knowledge through creating those I mentioned. And it will make us our source.
5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?
Answers:
Of course I'm getting hurt and I will report to the head of school to located who is that damn sender. Or else I delete that email and forget what they send and I will put into my mind that they are insecure to me and I really don’t care what they say. What I'm going to do is focus on my study and stop thinking those issues that can turn me down.




Name: Angelie Flor M. Yamson BSIT-III

Chapter 4 Case Study

1.       Your friend is considering using an online service to identify people with compatible personalities and attractive physical features who would be interesting to date. Your friend must first submit some basic personal information then complete a five-page personality survey, and finally provide several recent photos. Would you advise your friend to do this? Why or why not?
 Answer:
 Of course No, because this idea might not be safe or good for the security of my friend. I could say that it’s not secure enough because going into a date must be ask or planned personally by a group or the person involve with it. By the situation, I rather find a guy who is interested with my friend than letting her engage into an online service which is basically unsafe for a reason that he or she didn’t know the background of such person that my friend is going out with. As we all knew that there are lot of online scam are spreading today which results in fooling a person and the worst is into a crime. I don’t want to put my friends in danger. I care about them and I disagree online services in identifying people who are interested to her or him.

2. You are a recent college graduate with only a year of experience with your employer. You were recently promoted to manager of email services. You are quite surprised to receive a phone call at home on a Saturday from the Chief Financial Officer of the firm asking that you immediately delete all email from all email servers, including the achieve and back-up servers that are older than six months. He states that the reason for this request is that there have been an increasing number of complaints about the slowness of email services. In addition, he says he is concerned about the cost of storing so much email. This does not sound right to you because you have taken several measures that have actually speeded up email services. You recall a brief paragraph in the paper last week that stated several suppliers were upset about what they called “prince fixing” among the companies in you industry. What do you say to the Chief Financial Officer?
Answer:
Just because he is my Chief Financial Officer I will respect his request to delete all email from all email services. And I also appreciate his concerned about that costing of storing that email. But before that I ask first a permission to keep a copy for future references before deleting it. Because what if someone look for a certain email that one of the older.  

3. You have 15 years of experience in sales and marketing with three different organizations. You currently hold a middle management position and have been approach by a headhunter to make a move to a company seeking a chief privacy officer. The headhunter claims the position would represent a good move for you in your career path and lead to an eventual vice president of marketing position. You are not sure about the exact responsibilities of the CPO position or what authority the person in this position would have at this particular company. How would you go about evaluating this opportunity to determine if it actually is a good career move or a dead end?
Answer:
                In my 15 years of experience in sales and marketing is of course I want to promote or improve my position. But before receiving or accepting that position given to me, is I will evaluate first if it is good to me, what are those responsibilities, if there are benefits or what are those benefits. And if I deserve it, I will accept and I can say that it is the start of my good career.

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
                The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?
                Answer:
                I think there is a problem regarding that data to provide performance feedback that could result in pay increase or termination. But it’s good that there is a performance feedback because it can help to you to know where your time to adjust is. The problem is many data uses and too much data are make slowness. And to avoid this is you provide performance feedback in just a week, month, or year.

5. You have been asked to help developed  a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database,which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?
                Answer:

                I will develop a company policy that the unauthorized cant access just likes people who are not in that certain company. And make a customer database that can store more than 1.5 millions of records that the process is fast. And if ever the process is slow because of too much records, sort it with by letter, month or by year. Just databases your policy in order to access or view quickly.