Tuesday, April 17, 2012

Case Study: Chapter2


VIGNETTE
IT Technicians Fired After Reporting Child Porn

Questions to Consider:
1.)    What message is sent to IT workers by the actions of New York Law Schools and Colleges even if unrelated job-performance issues justified their actions in firing Gross and Perry?

*      Dean Matasar sent an email to New York faculty, staff, and students saying “I'm saddened to report to you that I learned this afternoon that our colleague, professor Edward Samuels, was arrested on charges relating to possession of childhood pornographic images” and they were fired because of this incident.


2.)    Since this incident, a number of states have enacted laws that require workers to report immediately any child pornography found while servicing equipment. Most of the laws state that worker who reports such a discovery is immune from any criminal, civil or administrative liability. Failure to report the discovery can result to a fine, imprisonment or both. Do you think such laws will encourage reporting? Why or why not?

*      Critics charge that this type of law unfairly transfers law enforcement duties to individuals who may not be qualified to handle evidence or determine what constitutes child pornography. Supporters say reporting mandates for photo labs have proven effective and that similar laws for IT workers will help combat child pornography on the Internet.


Case #3: When Certification Is Justified
Discussion Questions:
1.)    How can organizations and vendors change their certification programs to test or skills as well as core knowledge? What issues might this introduce?

*      The organization create a project management certification that give training to the employee and IT workers to gain the certificate needed for the job they are in. It gives chances to them to show not just the core knowledge but also to know how to use the knowledge.


2.)    What are the primary arguments against certification, and how can certifying bodies change their programs to overcome these short coming?

*      They argued that testable IT knowledge does not necessarily translate into quality IT work. They said that the IT worker needs to have good communication skills and they suspected that the workers paid for their certificate. Later, they decided to build training for them to gain the said certificate and be able to use it in their work, and also while there is no universal call for certification examination procedures that answers all needs within the IT progression, certifying bodies are beginning to adapt their programs to better fulfill the evolving needs for certification in IT.


3.)    What are the benefits of certification? How might certification programs need to change in the future to better serve the needs of the IT community?

*      The benefits of this certificate are the employee to easily find a job and they are well recognized as an IT expert through this certificate. Specific IT fields such as project management and security have a greater need for certification. Employers use certification as a hiring gate for entry level positions and for jobs that require specific core knowledge. Also, employers use certification as a means of training employees and increasing skill levels within the company. Certification programs need to change in the future to better serve the needs of the IT community like changing IT certification examination.

Case Study: Chapter1

VIGNETTE
Dubious Methods Used To Investigate Leaks By HEWLETT-PACKARD


Questions to Consider:
1.) Which issue is more disconcerting- the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? Defend your position.

*      In my own opinion the most disconcerting is the fact that a board member leaked confidential information public about the firm, it is because even thou they are a board member they still leaked information that is against the rules of the Company.
2.) Can the use of pretexting to gain information ever be justified? Is it considered legal under any circumstances?



*      For me pretexting is illegal. Because ,however, to use pretexting in order to obtain phone records or   you are doing things that are not assigned to you to gain some information in a particular company that you are working in, and benefiting financially from pretexting is actionable.


Case #3: Is There a Place for Ethics in IT?

Discussion Questions:
1.) Discuss how a CIO might handle Schrage’s scenarios using the suggested process for ethical decision making presented in this chapter?

*      In my own opinion the CIO should orient properly the process of formal and ethical process; they should develop a problem statement. It will help you make better decision, evaluate and choose an Alternative. The company plans to outsource the maintenance and support of the CRM system once it is developed, meaning that there is a good chance that two-thirds of the IT staff will be laid off. 
2.) Discuss the possible short-term losses and long-term gains in implementing ethical solutions for each of Schrage’s scenarios.

*      Base on my understanding short term losses that are business losses some of their amount of quantity and long term losses is they have the current needs to put up a specific project.
3.) Must businesses choose between good ethics and financial benefits? Explain your answer using Schrage’s scenarios as examples.

*      Yes, they can choose good ethics instead of financial benefits just like Schrage scenario the company plans to outsource its maintenance and support the CRM system once it is develop. If the business choose good ethics and with the correct process so the company will be successful, but  if the company choose the financial benefits but in a wrong process of making financial benefits the ethics is not apply because it is illegally wrong .

Friday, April 13, 2012

What takes to be an IT Professional?

Because of the size of the information technology sector, one of the choices many people make when transitioning to an IT career is to select one that will utilize their previous experience.

Information Technology Student, Technology Schools, IT student Information technology is hot with many career paths including artificial intelligence, robotics, interactive media and web design, network management, programming, and computer forensics. You can increase your marketability by earning IT certifications offered through Microsoft in database administration, systems engineering, applications development.

For me as a BSIT student, it is not easy to enter into the world of computer. But because I’ve choose BSIT to be my course, I will did my best to become an IT Professional. There are many ways to become an IT Professional, at first the BSIT will provide a pathway from technology related degree programs offered by school community colleges into a bachelors level education, and then on to IT positions in the public and private sectors, profit and non profit. Every exercises assigned throughout the BSIT will be designed to be of the kind that a student might encounter in his or her work: collaboration, competence, and outcomes assessment will be the hallmark characteristics of the program. The important also in this course is that you work in teams to produce solutions. Use spreadsheets for data analysis and presentations and present solutions in writing and spoken presentations.