Martes, Pebrero 24, 2015

Privacy and Freedom expression

Chapter 4

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?

Answer-> He/she is responsible in the system how it works and how the system affects the company’s improvements. Also, the system manager ask for a task that to develop an inventory control system and can monitor the quantity and movement of all finished products placed in the warehouse. The manager wants to use it for the productivity of their company. So, if he/she use it, it could arise some problems for the reason of the case inventory system is far from the system for monitoring of workers productivity. In this case maybe the system will be having new features to identify the needs incase if the manager really want it to use or maybe  if this existing system can’t help or it only cost too much, you can demand of what you really want for the system do.


5.You have been ask to help develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database, which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?

Answer->In this case, we can follow the right or a proper security procedure in developing the company’s policy by which this can help because data breach is an intentional or unintentional release of secure information and it includes unintentional information disclosure and others. So, it must follow the proper security procedures to prevent the data breaches of larger database.


6. You are a new brand manager for a product line of Coach purses. You are considering purchasing customer data from a company that sells a large variety of women’s products online. In addition to providing a list of names, mailing addresses, and email addresses, the data includes an approximate estimate of customer’s annual income based on the zip code in which they live, census data, and highest level of education achieved. You could use the estimate annual income ?

Answer->Base in this case, yes, they can estimate the annual income of the one who registered only because it provides the information placed in the data of the registered one. Not included some who does not any information stored in his/her purchased data. So, it means not all can buy or know the information of their products.


7.Your company is rolling out a training program to ensure that everyone is familiar with the company’s  IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of the training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with the anticipated resistance to the policy?

Answer->I have a task to develop a key piece in which it needed. Yes, we can implement the key piece that all of the members knows it. I expect that maybe they follow it but not all of them you can please to accept because not all members wants it. So, if this case happen, I may explain carefully with the benefits we can get from it and to be able them to know the importance of key piece company’s IT usage policy.


Chapter 5

1.A former high school classmate of yours who has returned to China, emails you that he has offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?

Answer->As we called it “FRIENDS” I know that there are thing that we knows but in this case I would suggest that he must accept the opportunity given. It includes comments that is favorable to the government, of course he can do what they want but I suggest also that if he commented favorable in the government he must looked his footstep before he take the favored to the government that it can’t offend to others. He would not rely on the law of freedom expression because even the law has an exemption.


2.Your 15-year-old nephew exclaims “Oh wow!” and proceed to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed beside a discussion on sexting?

Answer->First, his not his fault! But as a women, I want him to know the consequences if he do what he want to do. First place, that his girlfriend, he should protect it from the public. Second, he can destroy his girlfriend’s dignity and as a girl. I want him to realize those things!


3.A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say to your friend about her idea?

Answer->Yes! He has a idea in that “PR” thing but it’s not a good thing to threaten people, it is an unethical behavior. If you want to do those thing, it must be in the good manner or you must avoid in doing unethical behavior in order you to maintain a good value.


4.You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?

Answer->Internet filtering this action it blocks desirable content on the internet. So, if they want to implement it, it is very acceptable for the reason of they want the children’s protection. But, I may suggest that instead of internet filtering, they can also use URL filtering because it may cause all content on the internet blocks that the student can’t access to their desired content. It affects the whole content, so? It also affects the user to use the content that he want to go.  I suggest it, because it may only filter those content that not available for children.


5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?

Answer->I would do the best thing, I ask who is sending me the hate email then I ask what was the reason why she/he hates me. If I have nothing to worry because I have done nothing to hurt then I must then say, I don’t have an idea why you hates me but I can’t please you about it. But if I have done that can hurt, I must supposedly ask as sorry for what I have done.


 6.A worker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the message “Anonymous”. Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with him. What would you say to your friend?


Answer->He’s right from protecting himself but he does not do it in the right way. Also, he should say it to the company instead of hiding it to them.

Walang komento:

Mag-post ng isang Komento