Linggo, Mayo 13, 2012

IS GOOGLE WATCHING YOU?

1. How does Google's business model use personal data?

    Ans. Google does use of personal data for their advertisements by sending information to the person from the advertisers.

2. What do you think are the major privacy concerns raised by Google’s business model and applications?

    Ans. I think the major privacy concerns raised by Google are data protection, major privacy blunder, and major hack attacks.

3. Do you think Google has taken adequate measures to protect its user's privacy?

    Ans. Yes, because Google gives their clients protection that they need. As a Google user, for some time I did not feel that I'm not protected of what Google provided me of their services.

VIGNETTE "PRIVACY CONCERNS ABOUND WITH NEW IRS SYSTEMS"

1. What information about you is being held, who is holding it, and what is this information being used for?


    Ans. The information being held about me is my personal information and contact information, the one who holds it is the one whom i gave it for, and that information is being used for storage in future use.


"When you give your personal details to an organisation or individual, they have a duty to keep these details private and safe. This process is known as data protection. We refer to organisations or individuals who control the contents and use of your personal details as 'data controllers'." 


Excerpt from - http://www.dataprotection.ie/docs/A_guide_to_your_rights_-_Plain_English_Version/858.htm


2. What measures are being taken to safeguard this information and what happens if it is inadvertently or deliberately stolen?


    Ans. Some measures that can safeguard this information is to publicize that your information has been stolen or you can directly ask for some support on what to do in these occurrences. 







COMPUTER AND INTERNET CRIME (CASE STUDY)

Vignette - Trading Scandal at Society General


1. Peter Gumble, European editor for Fortune magazine, comments, "Kerviel is a stunning example of a trader breaking the rules, but he's by no means alone. One of the dirty little secrets of trading floors around the world is that every so often, somebody is caught concealing a position and is quickly - and quietly - dismissed... [This] might be shocking for people unfamiliar with the macho, high-risk, high-reward culture of most trading floors, but consider this: the only way banks can tell who will turn into a good trader and who even the most junior traders to take aggressive positions. This leeway is supposed to be matched by careful controls, but clearly they aren't foolproof." What is your reaction to this statement by Mr. Gumble? 


   Ans. My reaction to this statement is that it is true that somebody is caught concealing a position and is quickly - and quietly - dismissed. This means that nowadays some people can easily get the position they want on a company and can also dismiss themselves immediately as they pleased to.



2. What explanation can there be for the failure of SocGen's internal control system to detect Kerviel's transactions while Eurex detected many suspicious transactions?

    Ans. The explanation of that is the SocGen is maybe too confident of what they have and it causes them to lower their guards. As what Pascal Decque, a financial analyst who covers for SocGen for Natixis (a leading player in corporate and investment banking), commented, "SocGen was brilliant in [its] achievement... the world leader in derivatives. Maybe when you are that good, you think you will never fail."




Whistle-Blower Divides IT Security Community

1. Do you think that Mike Lynn acted in a responsible manner? Why or Why not?

    Ans. Yes, because Mike Lynn did it for the better of his jurisdiction.

2. Do you think that CISCO and ISS were right to pull the plug on Lynn's presentation at the black hat conference? Why and why not?

   Ans. For me, it's no, because for some reasons that Mike Lynn only wants to express what he have found out or his discovery.

3. Outline a more reasonable approach toward communicating the flaw in the CIsco routers that would have led to the problem being promptly addressed without stirring up animosity among the parties involved. 

   Ans. The best reasonable approach for me is a direct communication to the other parties in which they can talk or express what they want to say in orderly manner without having vital confrontations.

Martes, Abril 17, 2012

WHEN CERTIFICATION IS JUSTIFIED

1. How can organizations and vendors change their certification programs to test for skills as well as core knowledge? What issues might this introduce?

    Ans. They can change their certification programs by developing exercises to test the skills and the core knowledge of an IT worker. They might introduce the IQ test or a psychological test.


2. What are the primary arguments against certification, and how can certifying bodies change their programs to overcome these shortcomings?

    Ans. IT workers argued that testable IT knowledge does not necessarily translate into quality IT work. They can overcome these shortcomings by focusing on skills and knowledge that are related to their current projects.


3.  What are the benefits of certification? How might certification programs need to change in the future to better serve the needs of the IT community?

    Ans. The benefits of certification is that it can prove if an IT worker is qualified for a certain job or not. It can upgrade the basis of the regular qualifications of a company and might provide the needs of an employer.


 

IS THERE A PLACE FOR ETHICS IN IT?

1. Discuss how a CIO might handle Schrage’s scenarios using the suggested process for ethical decision making presented in this chapter.

    Ans. The CIO must not let Schrage's scenarios be fulfilled because of some reasons that may affect the demand for ethical behavior when implementing IT.


2. Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage’s scenarios.

    Ans. There are some readers argued that CIOs must consider a company's long-term needs rather than just the current needs of a specific project. Others argued that engaging in unethical behavior, even for the best of purposes, crosses a line that eventually leads to more serious transgressions.


3.  Must business choose between good ethics and financial benefits? Explain your answer using Schrage’s scenarios as examples.

    Ans. Yes, because these two counterparts with each other. A business must choose between these two which they see is for the best of their business because each one may affect the other. 

Biyernes, Abril 13, 2012

WHAT TAKES TO BE AN IT PROFESSIONAL?

IT Professional:

• are competent;
• know their limitations, and are willing to push these back continuously;
• are discreet and respect confidentiality;
• stick to promises and agreements;
• are loyal and honest towards clients and colleagues;
• practice what they preach;
• are strongly motivated by ethical values;
• are rational and objective, but respect their partners’ emotions;
• are creative;
• are independent, but communicate well;
• are willing to be held accountable and to explain their actions, and report unasked;
• are willing to share knowledge and skills;
• foster professionalism in others, wherever they find it.

These traits will take you to be an IT professional in no time.

As of now being a student, we must have POSITIVE ATTITUDE: helps to cope more easily with the daily affairs of life. It brings optimism into our life, and makes it easier to avoid worry and negative thinking. If we adopt it as a way of life, it will bring constructive changes into our life, and makes them happier, brighter and more successful. With a positive attitude we will see the bright side of life, become optimistic and expect the best to happen. It is certainly a state of mind that is well worth developing and strengthening.