Chapter 4
The warehouse
manager is excited about using case movement data to monitor worker
productivity. He will be able to tell how many cases per shift each operator
moves and he plans to use this data to provide feedback that could result in
pay increases or termination. He has asked you if there are any potential problems
with using the data in this manner and, if so, what should be done to avoid
them. How would you respond?
Answer-> He/she is responsible in
the system how it works and how the system affects the company’s improvements.
Also, the system manager ask for a task that to develop an inventory control
system and can monitor the quantity and movement of all finished products
placed in the warehouse. The manager wants to use it for the productivity of
their company. So, if he/she use it, it could arise some problems for the
reason of the case inventory system is far from the system for monitoring of
workers productivity. In this case maybe the system will be having new features
to identify the needs incase if the manager really want it to use or maybe if this existing system can’t help or it only
cost too much, you can demand of what you really want for the system do.
5.You have
been ask to help develop a company policy on what should be done in the event
of a data breach, such as unauthorized access to your firm’s customer database,
which contains some 1.5 million records. What sort of process would you use to
develop such a policy? What resources would you call on?
Answer->In this case, we can follow
the right or a proper security procedure in developing the company’s policy by
which this can help because data breach is an intentional or unintentional
release of secure information and it includes unintentional information
disclosure and others. So, it must follow the proper security procedures to
prevent the data breaches of larger database.
6. You are a
new brand manager for a product line of Coach purses. You are considering
purchasing customer data from a company that sells a large variety of women’s
products online. In addition to providing a list of names, mailing addresses,
and email addresses, the data includes an approximate estimate of customer’s
annual income based on the zip code in which they live, census data, and
highest level of education achieved. You could use the estimate annual income ?
Answer->Base in this case, yes,
they can estimate the annual income of the one who registered only because it
provides the information placed in the data of the registered one. Not included
some who does not any information stored in his/her purchased data. So, it
means not all can buy or know the information of their products.
7.Your
company is rolling out a training program to ensure that everyone is familiar
with the company’s IT usage policy. As a
member of the Human Resources department, you have been asked to develop a key
piece of the training relating to why this policy is needed. What kind of
concerns can you expect your audience to raise? How can you deal with the
anticipated resistance to the policy?
Answer->I have a task to develop a
key piece in which it needed. Yes, we can implement the key piece that all of
the members knows it. I expect that maybe they follow it but not all of them
you can please to accept because not all members wants it. So, if this case
happen, I may explain carefully with the benefits we can get from it and to be
able them to know the importance of key piece company’s IT usage policy.
Chapter 5
1.A former
high school classmate of yours who has returned to China, emails you that he
has offered a part-time job monitoring a Chinese Web site and posting comments
favorable to the government. How would you respond?
Answer->As we called it “FRIENDS” I
know that there are thing that we knows but in this case I would suggest that
he must accept the opportunity given. It includes comments that is favorable to
the government, of course he can do what they want but I suggest also that if
he commented favorable in the government he must looked his footstep before he
take the favored to the government that it can’t offend to others. He would not
rely on the law of freedom expression because even the law has an exemption.
2.Your
15-year-old nephew exclaims “Oh wow!” and proceed to tell you about a very
revealing photo attachment he just received in a text message from his
14-year-old girlfriend of three months. He can’t wait to forward the message to
others in his school. What would you say to your nephew? Are further steps
needed beside a discussion on sexting?
Answer->First, his not his fault!
But as a women, I want him to know the consequences if he do what he want to
do. First place, that his girlfriend, he should protect it from the public.
Second, he can destroy his girlfriend’s dignity and as a girl. I want him to
realize those things!
3.A college
friend of yours approaches you about an idea to start a PR firm that would
specialize in monitoring the internet for “Bad PR” about a company and “fixing”
it. One tactic the firm would use is to threaten negative posters with a libel
lawsuit unless they remove their posting.
Should that fail, the Pr firm will generate dozens of positive postings
to outweigh the negative posting. What
would you say to your friend about her idea?
Answer->Yes! He has a idea in that
“PR” thing but it’s not a good thing to threaten people, it is an unethical
behavior. If you want to do those thing, it must be in the good manner or you
must avoid in doing unethical behavior in order you to maintain a good value.
4.You are the
computer technical resource for country’s public library system. The library is
making plans to install internet Filtering Software so that it will conform to
the children’s Internet Protection Act and be eligible for federal funding.
What sort of objections can you expect regarding implementation of internet
filters? How might you deal with such objections?
Answer->Internet filtering this
action it blocks desirable content on the internet. So, if they want to
implement it, it is very acceptable for the reason of they want the children’s
protection. But, I may suggest that instead of internet filtering, they can
also use URL filtering because it may cause all content on the internet blocks
that the student can’t access to their desired content. It affects the whole
content, so? It also affects the user to use the content that he want to go. I suggest it, because it may only filter
those content that not available for children.
5. Imagine
that you received a hate email at your school or job. What would you do? Does
your school or workplace have a policy that covers such issues?
Answer->I would do the best thing,
I ask who is sending me the hate email then I ask what was the reason why
she/he hates me. If I have nothing to worry because I have done nothing to hurt
then I must then say, I don’t have an idea why you hates me but I can’t please
you about it. But if I have done that can hurt, I must supposedly ask as sorry
for what I have done.
6.A worker confides to you that he is going to
begin sending emails to your employer’s internal corporate blog site, which
serves as a suggestion box. He plans to use an anonymous remailer and sign the
message “Anonymous”. Your friend is afraid of retribution from superiors but
wishes to call attention to instances of racial and sexual discrimination
observed during his five years as an employee with him. What would you say to
your friend?
Answer->He’s right from protecting
himself but he does not do it in the right way. Also, he should say it to the
company instead of hiding it to them.
Walang komento:
Mag-post ng isang Komento