Lunes, Pebrero 23, 2015

Chapter 4

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?

ANSWER: Being a systems manager I am responsible for the system and how it was being used. In this case, we are task to develop an inventory control system that could monitor the quantity and movement of all finished product stored in a warehouse. The warehouse manager then wants to use the system to monitor the worker productivity. As a result, it could arise some problems because the case inventory system functions not that suitable for monitoring the productivity of the workers. However, if the warehouse manager really wants that kind of feature for the system which could also improve their organization, we can put some additional features that would know the workers productivity.


5.You have been ask to help develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database, which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?

ANSWER: Base on the definition, data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. In this event I would follow the proper security procedures in developing such policy because failure to follow this will result to data breaches of large databases. Aside from that, I would also develop a process that from the perspective of security prevention, the risk analysis process is an appropriate method of identifying threats and vulnerabilities to medical information and determining if existing privacy and security controls are sufficient to prevent security breach from occurring. A proper risk analysis involves a three-step process identifying, evaluating, and eliminating or reducing risk.    


6. You are a new brand manager for a product line of coach purses. You are considering purchasing customer data from a company that sells a large variety of women products online. In addition to providing a list of names, mailing addresses, and email addresses the data includes an approximate estimate of customer’s annual income based on the z code in which they live, census data and highest level of education achieved. You could use the estimate of annual income to identify likely purchasers of your high-end purses, and use email addresses to send emails announcing the new product line and touting its many features. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion in this instance? Why or why not?

ANSWER: The advantage of this is the fact that it is less time consuming for promoting or making an advertisement for their product because when they somehow ‘endorse’ their product together with its new features, the information of it will automatically be sent to those customers. The disadvantage of this is that if there are only few customers’ data that they’d buy, there are also few people that could know their new product. Also, the customer data that I bought are obviously more on women, therefore, it just simply mean that the promotion of products are limited to women only because they are only the ones who could view the ‘ad’ on their emails. As a brand manager, I will not recommend this means of promotion because aside from the fact that it is not ethical because this is a sort of data breaching, it is not also practical and effective for making promotions for product since this marketing strategy depends on the customer data that you have been purchased and comparing its relation or connection to your product.


7. Your company is rolling out a training program to ensure that everyone is familiar with the company’s IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of the training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with the anticipated resistance to the policy?

ANSWER: Being a part of the human resources department, I could anticipate that not all of the employees would agree to the policy, but in order for them to better understand the said policy, I would give them further explanations that this policy could help them to perform effectively and responsibly. This training could also develop their personality and working ability in the workplace and not just that, it could also help improve the organization.



Chapter 5

1. A former high school classmate of yours who has returned to China, emails you that he has offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?

ANSWER: As a response, I will tell her that it is nice that she has that kind of job but as a friend I will suggest that she must be aware what she was writing on her comments. She should see to it that her comments will not harm other people’s feelings or the other party involved. Though we have the thing we called freedom of expression we should still take responsible of the things we are expressing. I will also tell her that she should think  many times before writing any comments.


2. Your 15-year-old nephew exclaims “Oh wow!” and proceeds to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed beside a discussion on sexting?

ANSWER: I would tell my nephew that what he plans to do was unethical that it could destroy someone’s life. Also I would discuss to him the risk if he will do such thing, that it may cause his girlfriend to encounter social consequences. Images can easily escape their control through being shared more broadly than they had anticipated. This can have a long-term impact on their digital reputation. Those images can also potentially be used for cyber bullying or cyber stalking, or they may attract unwanted attention from others.


3. A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say to your friend about her idea?

ANSWER: As a friend, I am going to tell her that I commend her idea because of its good intention for the company since it could monitor the internet for “Bad PR” and try to fix it. But somehow, there should also be limitations on her actions regarding threatening negative posters. She should also observe ethical values in this kind of job.


4. You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?

ANSWER:Pornography on public library computers is a real problem, but a seemingly obvious solution, filtering technology, comes with issues of its own.
When Internet access came to public libraries, the issue of whether and how to filter out access to pornography followed close behind – and just won’t go away.But there are some parties who recommends against the use of automated filters, arguing they make too many mistakes and are inconsistent with a library’s commitment to intellectual freedom. But while many library directors fight to keep filters out, or minimize their use, others have had to fight to defend their Internet filtering policies. As a computer technical resource for country’s public library system I will weigh both sides’ opinion involved in the issue. I will see to it that whatever my decision is, it is for the betterment and welfare of the children. With these, I will still consider internet filtering software to conform the Children’s Internet Protection Act.

5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?

ANSWER:  The thing that I would do is to know who sends hate email to me. Then, I would tell my parents about this email. And at school, there might be a policy that covers this issue since they care about our welfare and so, I will tell my teachers about it so that the one who have been sending the emails could be tracked and this problem will be solved.


6. A worker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the message “Anonymous”. Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with him. What would you say to your friend?


ANSWER: I would tell my friend that he could express his feelings by sending emails to our employer’s internal corporate blog but still hiding his identity by signing his message as “Anonymous”. In this way, he could protect himself and his identity from the possible retribution from the superiors. I support his eagerness to expose his observance on racial and sexual discrimination that happened in their workplace and I think sending his emails was a right move for the concerns to take an action to this kind of problem in the organization.

Walang komento:

Mag-post ng isang Komento