Huwebes, Pebrero 26, 2015

Intellectual Property and Software Development

Chapter 6
  1. you have been asked by the manager of software development to lead a small group of software developers in an attempt to reengineer the latest release of the software by your leading competitor. The goal of the group is to identify features that could be implemented into the next few releases of your firm software. You are told that the group would relocate from the united states to the island of Antigua, in the Caribbean sea, to “reduce the risk the group being destructed by the daily pressures associated with developing fixes and enhancements with the current software release.” What sort of legal and/or ethical questions might be raised by the reengineering effort? Would you consider taking this position?
  • The position given to me from the manager of software development to lead a small group of software developers is a big opportunity and yes I will take the opportunity. The sort of legal or ethical questions might be raised will be not offensive to the developers of the current release software because there are some features you and your group don’t like. So, well, let just ask some questions to the developers that can’t offend them. First, in relocating to the island of Antigua, in the Caribbean Sea, maybe it’s just for the group to work efficiently because it has a good place to work but my question is why we should go far? Why? We can’t do it here? Of course, we can do it here without a pressure and not be distracted by others. Just we can do it in a place here in United States that we can efficiently work for the developing and searching for a place. Secondly, if we go there, it cost too much unlike here we can cost but it’s just a small amount.
  1. You have procrastinated to long and now your final paper for your English course is due in just 5 days- right in the middle of the final exam week! The paper counts for half your grade for the term and would probably take you at least 20hrs. Of research and write. Your roommate, an English major with a 3.8GPA, has suggested 2 options. (1) He will write an original paper for you for $100, or (2) he will show you 2 of 3 “paper mill” websites, from which you can download a paper for less than $35. You wanted to do the right thing, but writing the paper will take away from the time you have available to study for your final exam in 3 other courses. What would you do?
  • Yes, I want to do the right thing for all of this. I will do the paper given to me, research and write it not in the consecutive hours, I will give some hours/time to do it and I will estimate that it can be exact in 20 hours before or during the deadline. So, I can give time for studying my 3 others courses examination within the range of the time.
  1. You are beginning to feel very uncomfortable in your new position as a computer hardware salesperson for a firm that is the major competitor of your previous employer. Today for the second time, someone has mentioned to you how valuable it would be to know what the marketing a new product development plans whereof your ex-employer. You stated that you are an able to discuss such information under the non disclosure contract signed with your former employer, but you know your response did not satisfy your new co-workers. You fear that the pressure to reveal information about the plans of your former company is only going to increase over the next few weeks. What do you do?
  • I would do the right, I will discuss to them as my employer does. But, of course I will not reveal the main or controversial one for the satisfaction of my co-workers. Also, I should provide the exact information in them.
  1. You have been asked to lead your company’s new competitive intelligence organization. What would you do to ensure that members of the new organization obey applicable law and the company’s own ethical policies?
  • As a new leader of the campany's competitive intelligence organization, to ensure that my members will obey the law and ethical policies, I would explane carefully and understandable about the law and policies in the company and I will discuss also what would the consequences of doing unethical or doing things against the policies of the company.
  1. You are the vice president for software development at a small, private firm. Sales of your firms’ products have been strong, but you recently detected a patent infringement by one of your larger competitors. Your in-house legal stuff has identified 3 options: (1) ignore the infringement out of fear that your larger competitor will file numerous counter-suits; (2) threaten to file suite, but try to negotiate an out-of-court settlement of an amount of money.
  • Threating people and negotiating it in an out-of-court settlement of an amount of money is an act of unethical behavior but you as a vice president of the company you can’t ignore the patent infringement happening in the company. I would not do to threat some people who do patent infringement. It has a law for the patent privacy, it is the law who can do what is/are the right way to do so and it is the law who can punish him/her in accordance to the exact way he/she does.
Chapter 7
1. Apple Guidelines for App Approval
Apple’s App Store has been a huge success ever since it was launched in 2008. As of the end of 2010, the app store offered more than 250, 000 applications available for sale to owners of apple, iPhone, iPad and iPod devices, with more than 6.5 Billion downloads since it opened.
Before software applications can be solved throught the App Store, they must go through a review process. Apple has been accused by some of using clandestine and capricious rules to reject some programs and thus blocking them from reaching the very large and growing market of iPhone, iPad, and iPod touch users. One application developer complained: “ if you submit an app, you have no idea whats going to happen. You have no idea it’s going to be approved or if it’s going to be disapproved.” The developers of an app called “South Park” complained that their app was rejected because the content was deemed “potentially offensive ,” even though episodes of the award-winning animated sitcom are available at the Apple iTunes Store. In September 2010, after more than two years of complains, apple finally provided applications developers the guidelines it uses to review software.
Most guidelines seem to be aimed at ensuring that Apple users can only access high quality and non-controversials Apps from its Apps Store. Some of the Apple guidelines are clear and their rationale is easy to understand, such as “ apps that rapidly drain the device’s battery or generate excessive eat will be rejected.” However, other guidelines are unclear and highly subjective, such as “ we will reject apps for any content or behavior that we believe is over the line.” What line, you ask? Well, as a Supreme Court Justice once said ,“ I’ll know it when i see it. ‘ and we think that you will also know it when you cross it. (“ I know it when I see it” was the phrase used by U.S Supreme Court Justice Potter Stewart to describe his ability to recognize rather than to provide a precise definition of hard core pornography and his opinion in the cae Jacobellis v. Ohio in 1964.)
The electronic frontier foundation believes that while the guidelines are helpful, in some cases apple is defining the content of third-party software and placing limits on what is available to customers of Apple’s App Store.
By way of comparison, Google places few restrictions and developers of software for its competing Android Marketplace. However, there have been many low-quality applications offered to Android Marketplace customers, including some that include unwanted malware. Indeed by early 2011, google had pulled 21 Android applications from its Android Marketplace because, once downloaded, the applications not only stole users’ information and device data but also created a back door for even more harmful attacks. Apple’s decision to finally share applications guidelines may have been an attempt to combat the rapidly increasing popularity the android. It may also have been a response to a U.S Federal Trade Commissions investigations of a complaint for Adobe concerning Apples banning of the flash software from devices that run using Apple’s iOS operating system (Adobe Flash player is a browser-based applications that runs in many computer hardware/ operating system combination and support the viewing of called “rich, expressive applications,” content, the videos across screens and browsers .)
Discussion Questions:
  1. Should Apple conduct extensive screening of Apps before they are allowed to be sold on the App Store? Why or why not?
  • Yes, it should have to conduct the extensive screening of Apps allowing to sold it for the reason of there are some Apps that harmful to the users phone or to the user itself because as I read the discussion some Apps has a malware and some harm that it can provide back door to get the users personal information. Also, some Apps if you already installed it, these Apps can drain your battery fast. So, they must screen the Apps before selling it or allowing selling it in order the user’s safety and for the good feedback of their Apps.
  1. Do research to determine the current status of the FCC investigation of Apple for banning use of the Adobe Flash software and devices that use the iOS operating system.
  • Of coarse it has, they can determine if they do research because many of researcher has a higest percentage to come up the current issues. So, there is a big possibility to determine the current issues of the FCC investigation of Apple for banning use of the Adobe Flash software and devices that use the iOS operating system.
  1. What do you think of Apple’s guidelines that say it will reject an App for any content or behavior that they believe is over the line? Could such statement be construed as a violation of the developer’s freedom of speech? Why or why not?
  • No, it is not construed as a violation for the developers’ freedom of expression because if the Apps really over the line it is not acceptable for the publication to the Apps Store and it will affect them if they do.

Martes, Pebrero 24, 2015

Privacy and Freedom expression

Chapter 4

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?

Answer-> He/she is responsible in the system how it works and how the system affects the company’s improvements. Also, the system manager ask for a task that to develop an inventory control system and can monitor the quantity and movement of all finished products placed in the warehouse. The manager wants to use it for the productivity of their company. So, if he/she use it, it could arise some problems for the reason of the case inventory system is far from the system for monitoring of workers productivity. In this case maybe the system will be having new features to identify the needs incase if the manager really want it to use or maybe  if this existing system can’t help or it only cost too much, you can demand of what you really want for the system do.


5.You have been ask to help develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database, which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?

Answer->In this case, we can follow the right or a proper security procedure in developing the company’s policy by which this can help because data breach is an intentional or unintentional release of secure information and it includes unintentional information disclosure and others. So, it must follow the proper security procedures to prevent the data breaches of larger database.


6. You are a new brand manager for a product line of Coach purses. You are considering purchasing customer data from a company that sells a large variety of women’s products online. In addition to providing a list of names, mailing addresses, and email addresses, the data includes an approximate estimate of customer’s annual income based on the zip code in which they live, census data, and highest level of education achieved. You could use the estimate annual income ?

Answer->Base in this case, yes, they can estimate the annual income of the one who registered only because it provides the information placed in the data of the registered one. Not included some who does not any information stored in his/her purchased data. So, it means not all can buy or know the information of their products.


7.Your company is rolling out a training program to ensure that everyone is familiar with the company’s  IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of the training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with the anticipated resistance to the policy?

Answer->I have a task to develop a key piece in which it needed. Yes, we can implement the key piece that all of the members knows it. I expect that maybe they follow it but not all of them you can please to accept because not all members wants it. So, if this case happen, I may explain carefully with the benefits we can get from it and to be able them to know the importance of key piece company’s IT usage policy.


Chapter 5

1.A former high school classmate of yours who has returned to China, emails you that he has offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?

Answer->As we called it “FRIENDS” I know that there are thing that we knows but in this case I would suggest that he must accept the opportunity given. It includes comments that is favorable to the government, of course he can do what they want but I suggest also that if he commented favorable in the government he must looked his footstep before he take the favored to the government that it can’t offend to others. He would not rely on the law of freedom expression because even the law has an exemption.


2.Your 15-year-old nephew exclaims “Oh wow!” and proceed to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed beside a discussion on sexting?

Answer->First, his not his fault! But as a women, I want him to know the consequences if he do what he want to do. First place, that his girlfriend, he should protect it from the public. Second, he can destroy his girlfriend’s dignity and as a girl. I want him to realize those things!


3.A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say to your friend about her idea?

Answer->Yes! He has a idea in that “PR” thing but it’s not a good thing to threaten people, it is an unethical behavior. If you want to do those thing, it must be in the good manner or you must avoid in doing unethical behavior in order you to maintain a good value.


4.You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?

Answer->Internet filtering this action it blocks desirable content on the internet. So, if they want to implement it, it is very acceptable for the reason of they want the children’s protection. But, I may suggest that instead of internet filtering, they can also use URL filtering because it may cause all content on the internet blocks that the student can’t access to their desired content. It affects the whole content, so? It also affects the user to use the content that he want to go.  I suggest it, because it may only filter those content that not available for children.


5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?

Answer->I would do the best thing, I ask who is sending me the hate email then I ask what was the reason why she/he hates me. If I have nothing to worry because I have done nothing to hurt then I must then say, I don’t have an idea why you hates me but I can’t please you about it. But if I have done that can hurt, I must supposedly ask as sorry for what I have done.


 6.A worker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the message “Anonymous”. Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with him. What would you say to your friend?


Answer->He’s right from protecting himself but he does not do it in the right way. Also, he should say it to the company instead of hiding it to them.