Saturday, October 8, 2011

Assignment 2 - Finals


Case Study #2F:


a.      Pick one article and write a commentary not more than 400 words but not less than 100 words about what you read.

Answer:


New cloth self-cleans by killing bacteria

Discovery is great, I salute chemists out of the University of California at Davis who discover this kind of cloth  which can killed bacteria and breaking down toxic chemicals through exposing to the sunlight. I can say that if this cloth would be implemented and made of it can really help us to be protected from bacteria especially for clothing for health care workers who usually work against the exposing from bacteria and viruses and if this cloth is made of for them it can really help them from their own shield for diseases. It also appropriate for farmers who work hard exposing to the sunlight it can really help them also to be protective. And for military personnel if there suit are made of this kind of cloth possibly result in a good result. I was thinking that it also best for kids where they were playing under the sun and I was read on this blog that it is good for hospital curtains and patient cloth. All in all if this cloth would be made of for sure safeties are enhance. I salute!!

2.      Search the interest about:

a.      How Obama wins his Presidency through the use of Blogsite. (link references)

Answer:


b.     Fortune Magazine’s listed Xeni Jardin, Ben Trott and Mena Trott, Jonathan Schwartz, Jason Goldman, Robert Scoble, and Jason Calacanis as 8 Bloggers that business people “could not ignore”. WHY DO BUSINESSMAN SHOULD NOT IGNORE THESE BLOGGERS.

Answer:

Business people should not ignore these bloggers namely Peter Rojas discussed about engadget which means coverage of gadgets and consumer electronic, Xeri Jardin is one of the Americana blogger, a digital media commentator, Ben Trott and Mena Trott  they create Movable Type and Type Pad, Jason Goldman, Robert Scoble and Jason Calcanis are those people who has highly contribute about what business it is? Those people have been acknowledge by government. And business people should not ignore these for the reason that they are the one imposing this kind of blog site to know what worth of having a business in our real life.

c.      BLOGS are one of the driving forces behind the Rathergate scandal involving Dan Rather of CBS and some memos address in the show 60 minutes (http://www.wordiq.com/definition/Rathergate). What was the content of this blog that make Dan Rather a History to the world of a Blogger?

Answer:

In this blog about Rathergate it’s shows the story critizing President Bush n what he did in the Texas Air National Guard that seen in the 60 Minutes show hosted by David Rather and because of this all bloggers got their attention on that kind of information and what we called Rathergate because is often referred to by conservatives. It’s become History to the world of blogger because it’s milestone in the shift of power away from traditional centralized news sources caused by the influence of Internet Technologies and other doubts it’s lasting significance for all.

3.      Visit http://www.philippineblogawards.com.ph/category/philippine-blog-awards-2010/. Pick one blog and discuss it not more than 1000 words but not les than 400 words. What have you learned in this blog?

      Answer:


It’s not like just ordinary fashion blog. The author gives fashion advices that are practically pleasing to the eye with a touch of observational humor and bit of sarcasm. When we say beauty and fashion we should enhance both of this, not like just only s good to see to be beautiful and suitable. Because when we are in fashion it made us beautiful for fashion like this “pocket bac” we should know if it best to have if it and have an improvement in our self. Being sosyal brought up on fashion even though were in low level of life when we get into fashion the reality was fade out just like blogger told. All of it has own fashion; fashion for style, hair, dress, accessories, things, designs and many more it’s gives us satisfactory when our fashion are become trends to everyone. Just like expressing our feelings through fashion that what we believe beauty on us.

 The “pocket bac” that usually trend now a day’s “uso” of what we called. I’m just confusing while a lot of girls have hand sanitizer hang on their bags? And I found out  that it’s a fashion for them LOL…I was thinking that some other people if what are the newest fashion trends now a days they follow on it even though it’s not suitable for them? And I found out that this blog can give advices on what the best thing we can do when we want to be in fashion and made  us to be beautiful. And in this sosyalera.net they advocate the fashions to all, no discrimination, all we can do is believing ourselves and have a self confidence on what we want to be or to do..

 Also for Havaianas Filipinas Collection, fashion has become an avenue to express love for one’s country. I am proud to have this kind of collection because it’s Philippine pride. And I am amaze on how they design and made the logos for Havaianas. This attitudes truly match the Filipino culture and even the brand’s cheery personality. They said “Tangkilikin Ang Sariling Atin” and I am one of the proudly Pinoy. We should use to advocate this policy and be fashionate to all made of Philippines.

 So guy’s  be fashionable and become more beautiful!!

4.      Given the chance to blog, what topic would you like to publish?

      Answer:

WHAT IS THE GREAT MOTTO FOR SINGLE  LADIES?

How’s your life? Love life?

Well, when we say single it means that you are free in everything no commitments, no responsibilities, no problems but what are the usually saying for single ladies? Think of it, there are a lot of sayings when it comes to be being single, we have reasons, or should I say excuses? Am I right?

Unfortunately, other woman don’t like to be settle down easily because they want to enjoy being single and other woman are afraid to be hurt that why is it, single ladies are becoming more and more compared to all men out there. Having someone is not a compulsory to everyone that’s why you should enjoy your life, destiny is there!

Be patient to wait don’t be in hurry because when God knows you are ready to have a commitment God has own way to find the right person for you.

Being single” is a term used to describe the state of a person being single and not committed. A single person unlike a committed person is not involved in any relationship. A single person has a multitude of friends and acquaintances and enjoys his single status. Being single is a privilege for many, since they are free to live life individually, without the pressures and expectations that are often associated with a committed relationship. Life is truly an unpredictable affair and you have no idea about how it can change at any point of time. So, people some people prefer being single rather than getting committed to someone. Dealing with relationships and making them successful is not everyone’s cup of tea. Relationships require emotional investment, as well as a lot of time to make things work. So, staying single is what people prefer usually

Here are some quoted sayings that surely can reflect what does the motto of all single ladies….
Learn and appreciate!!

“ I celebrate myself, and sing myself ”
            -WALT WHITMAN-

“ I’m single because I was born that way”
            -MAE WEST-

“ I don’t like to be labeled as lonely just because I am alone”
            -DELTA BURKE-

“ If you are single there are always one thing you should take out with you on Saturday night…..your friends”
             -SEX IN THE CITY-

“ Sometimes you have to stand alone to prove that you can still stand”
             -ANONYMOUS

“ I  don’t need a man to rectify my existence. The most profound relationship  we’ll ever have is the one  with ourselves”
              -SHIRLEY MacLAINE

“Being single used to mean that nobody wanted you. Now it means you're pretty sexy and you're taking your time deciding how you want your life to be and who you want to spend it with.”
          -Sex and the CitY

Being single isn’t bad. What is bad is giving up hope on finding that someone special.
-Anonymous

If you aren't good at loving yourself, you will have a difficult time loving anyone, since you'll resent the time and energy you give another person that you aren't even giving to yourself.
-Barbara De Angelis

Being single doesn't necessarily mean one is not wanted. In many cases it means that one knows what they want and if they can't find that someone special then they'll remain single forever because they're OK and happy with who they are and just want that someone special to complete them and take their happiness a higher level.

Don't worry if you're still single. God is looking at you right now saying, "I'm saving this girl for someone special

Maybe some women aren't meant to be tamed. Maybe they just need to run free till they find someone just as wild to run with them.
-sex in the city

You do not need to be loved, not at the cost of yourself. The single relationship that is truly central and crucial in a life is the relationship to the self. Of all the people you will know in a lifetime, you are the only one you will never lose.
- Jo Courdert

Being single isnt the cause of loneliness, and marriage is not necessarily the cure. There are many lonely married people as well
I really enjoy being single again. I spent a lot of time in a relationship and the nearer we came to the end, the more difficult it got. You don't see things clearly as long as you're still involved.
- Dido Armstrong

 I think it can be fun to be single and date-like when you don't want a relationship. Or when you've just gotten out of a relationship, and, after get over the initial shock, your thinking, Hey, it's kind of cool being single.
- Breckin Meyer


Friday, October 7, 2011

Assignment 1 - Finals


What Would You Do?

1.      As the information system manager for a small manufacturing plant, you are responsible for all aspects of the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in local warehouse. Each time a fork-lift operator moves a case of product, he or she must scan the UPC code on the case. Not only is the product information captured, but also the day, time, and fork-lift operator identification. This data is transmitted to LAN to the inventory control computer that then displays information about the case and where it should be placed in the warehouse.

      The warehouse manager is excited about using the case movement data to monitor the productivity of the workers. He will be able to tell how many cases per shift each operator moves, and plans to use data to provide performance feedback that could result in pay increases or termination. He has asked you if there are any potential issues with using the data in this manner, and, if so, what should be done to avoid them. How would you respond?

               Answer:
In this case they are advantage and disadvantage. For the goods of company it should be, because through this case movement data it can monitor the productivity of the worker and the production if it is in progressive stage but it is against to all workers because this privilege can harm their privacy in every act they did unless they have illegal doing. Because once you are in the company you are responsible in every act you will do.

2.      As a young and highly successful member of your company’s marketing organization, you have been asked to take on the role of your company’s first ever CPO. What questions would you ask before accepting this role? Assume that you have agreed to become the CPO. One of your first actions is to develop a comprehensive data privacy policy. How would you go about doing this?

Answer:
I will ask if I have also privacy and they can protect my privacy like what I need to do as CPO?. If I become CPO first I will assure that their privacy will be protected and protect the company initiatives, because through this I will develop and manage the customer privacy dispute through verification process. Through the help of my work we should be briefed on planned marketing programs, information systems/database that involve the collection or dissemination of consumer data.

3.      You are a new marketing manager for the Ford Motor Company. You are considering the use of spam to promote the latest and greatest automobile model that is targeted to young, affluent adults. List the advantages and disadvantages of such a marketing strategy. Would you recommend this means of promotion? Why or  why not?

Answer:
The advantages are it is easy to promote the product and the companies can be  offset by the generally negative perception of the public has of receiving unsolicited ads. The disadvantages are there’s no privacy protection for the recipients, for those who pay for their own advertisement, and for those who pay for internet connection charges on an hourly basis, this cost can add up.
For me, I should not go on spamming because as I am, I don’t want also to harm my privacy. I will respect their privacy even though Internet is the easiest way to promote one’s  product, I will not go, I’ll better to choose advertisement. Because a lot offer in a cheaper price and some are for free.

4.      You are the CPO of a medium-sized manufacturing company with sales of over $250 million per year with almost $50 million coming from internet-based sales. You have been challenged by the vice president of sales to change the company’s Web site data privacy policy from opt-in to opt-out and to allow the sales customer data to other companies. The vice president has estimated that this change would bring in at least $5 million per year in added revenue with little additional expense. How would you respond to that request?

Answer:
For me I will not change the company’s web site data privacy because once in for all this is generally known to all users and subscribers and I don’t care if it get cost $50 million as long as my profit is not affected.

Case Study # 1

1.      HIPAA and the Upcoming Furor over Medical Records

The goal of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is to require health care organization to implement cost-effective procedures for exchanging medical data. Health care organizations must employ standard electronic transactions, codes, and identifiers designed to enable them to fully “digitize” medical records and make it possible to use the internet rather than expensive private networks for electronic data interchange . the Department of Health and Human Services developed over 1500 pages of specific rules (see www.hhs.gov) governing the exchange of such data with compliance deadline of April 2003. The regulations affect 1.5 million health care providers, 7,000 hospitals and 2,000 health care plans.

Under the HIPAA provisions, health care providers must obtain written consent from patients for the use or disclosure of information in their medical records. Patients are also guaranteed the right to inspect and copy their medical records and suggest changes to correct inaccuracies. Health care providers must keep track of everyone who received medical information from patient’s medical file. Patients can demand that doctors and hospitals provide an accounting of all disclosures spanning the past six years. These provisions will affect every doctor, patient, hospital, pharmacy, and insurer.

Health care companies must appoint a privacy officer to develop privacy policies and procedures as well as to train employees in how to handle sensitive data. These actions must address the potential for unauthorized access to data by outside hackers as well as the move likely threat of internal misuse of data. It is the employee within the health care organization who is much more likely to compromise confidentiality, either intentionally or accidentally. For example, during an upgrade to one company’s information systems, hundreds of e-mail messages containing sensitive information were accidentally sent to members of a large HMO. Not only was there a potential loss of privacy due to the messages being intercepted by people who were not the intended recipients, but also each recipients lost some personal privacy by simply having his or her name appear on the distribution list for the message. Health care companies must also guard against the prospect of personnel with authorized access using data inappropriately-such as  a cardiologist reading a patient’s psychiatric records online and telling her that her chest pains are not real but related to her psychosis.

HIPAA assigns responsibility to health care organizations, as the originators of individual medical data, for certifying that their business partners (billing agents, insurers, debt collectors, research firms, government agencies, and charitable organizations) also comply with HIPAA security and privacy rules. This provision of HIPAA has health care executives especially concerned as they do not have direct control over the systems and procedures that their partners implement. Those who misuse data may be fined $250,000 and serve up to 10 years in prison.

As the full details of HIPAA have become better understood, many experts have become concerned. Some fear that between the increasing demands for disclosure of patient information and the impending full digitization of medical records, patient confidentiality will be lost. Many think that the HIPAA provisions are too complicated and will miss the original objective of reducing medical industry costs and instead increase costs and paperwork for doctors without improving medical care. All agree that the medical industry must make a substantial investment to achieve compliance. Government experts estimate that it will cost each hospital between $100,000 and $250,000 to comply with HIPAA’s data privacy and security regulations. Meanwhile, a study by Blue Cross/Blue Shield puts the costs much higher - $775,000 to $6 million per hospital.

The Agency for Healthcare Research and Quality (the research arm of the Department of Health and Human Services) states that HIPAA will require computer systems that can greatly reduce. If implemented correctly, the adverse reactions caused by medication errors. The agency estimates that hospitals will save $500,000 in direct costs annually.

Questions:

a.      What are the potential benefits from full implementation of HIPAA – from a patient’s perspective and from a health care organization’s perspective?

Answer:
               For the benefits of the patient’s perspective it is guaranteed the right to inspect and copy of their medical records and to suggest changes to correct inaccuracies and for health care organization on perspective its implement the cost effective procedures for exchanging medical data and have the privacy policies.

b.     What actions could a privacy officer take to be able to certify that a health care organization’s business partners also comply with HIPAA security and privacy rules?

Answer:
Health care companies must appoint a privacy officer to develop privacy policies and procedures as well as to train employees on how to handle sensitive data.

c.      What do you see as the likely negative effects of HIPAA? How well do you think these effects balance against the benefits?

Answer:
The negative effects of HIPAA are they do not have direct control over the systems and procedures that their partners implement and through this it can affect the balance against the benefits if it is happened to individual.

2.      Echelon – Top Secret Intelligence System

Echelon is a top-secret eavesdropping system managed by the National Security Agency (NSA) of United States and known to be used by the intelligence agencies of England, Canada, Australia, and New Zealand. It is capable of intercepting and decrypting almost any electronic messages sent anywhere in the world via satellite, microwave, cellular, or fiber-optic telecommunications, including radio and TV broadcasts, phone calls, computer-to-computer data transmission, faxes, and e-mail. It may have been in operation since as early as the 1970s, but it wasn’t until the 1990s that journalist using the FOIA were able to confirm its existence and gain insight into its capabilities. Although Echelon is the world’s  largest and most sophisticated surveillance network, it is by no means the only one Russia, China, Denmark, France, the Netherlands, Russia, and Switzerland operate Echelon-like systems to obtain and process intelligence by listening in one electronic communication.

Which electronic transmission are captured and what Echelon is able to do with messages is subject to much conjecture. Even if all electronic messages worldwide were unencrypted, finding those messages that warranted further attention would be an enormous, computer-intensive task. As a result, it is likely that Echelon targets communications to and from specific individuals and organizations rather than trying to assimilate all electronic messages. Thus, some subset of all possible messages is forwarded to the massive United States intelligence operations at Fort Meade, Virginia, where powerful computers look for code words or key phrases among the messages. Intelligence analysts peruse any conversation or document thus flagged by the system, and significant messages are then forwarded to the agency that requested the information.

A number of intelligence satellites in orbit are used to detect signals that normally dissipate into space – radio signals, mobile phone conversations, and microwave transmissions. In addition, at least six ground – based stations throughout the world are used to monitor the communication satellites of Intelsat, the world’s largest commercial satellite communications services provider.
Computer processing speeds and the science of speech recognition probably are not yet advanced enough for a real-time global listening system capable of transcribing the hundreds of thousands of calls that are happening at any instant in time. However, Echelon is capable of voice pattern matching and can identify who is speaking if their voice pattern is stored in its database. Also, it employs recording systems that are capable of automatically triggering tape recording based on “hearing” key words.

Echelon employs special software and speech recognition technology to convert any audio communication into formatted searchable text. A half-hour broadcast can be processed and stored in searchable format in 10 minutes. Currently the software understands only American English, but the CIA is enhancing it to handle Chinese and Arabic. Other Echelon software is used to alert intelligence analysts any time a new page goes up on a Web site of interest. CIA personnel use special software to perform searches in English of Web sites developed in Chinese, Japanese, Russian, and eight other languages. The software then translates the text of the Web site into English.

This immense, highly sophisticated surveillance system apparently operates with little oversight, and the various agencies that run Echelon have provided few details as to the legal guidelines governing the project. Indeed, the governments of the countries believed to be involved have failed to officially acknowledge the existence of Echelon. Because of this, there is no way of knowing its true capabilities and exactly how it is being used.

Echelon intercepts both sensitive government data and corporate information. It also provides the opportunity to illegally spy on private citizens. It is no wonder that privacy advocates are upset with the secrecy surrounding the system and its great potential for misuse. They feel that Echelon can be directed against virtually any citizen in the world with the full knowledge and cooperation of their government.

In the U.K. Echelon has already been accused of spying on organization such as Amnesty International – an International organization that seeks to ensure fair and prompt trials for political prisoners and that opposes human rights abuses. In addition, in September 1999, the European Union released a report highly critical of the operators of Echelon for using it to intercept confidential company information and divulging it to favored competitions to help win contracts. The report alleged that Airbus Industrie of France lost valuable contracts because information intercepted by Echelon was forwarded to the Boeing Company to help it obtain a competitive advantage.

In the United States, the ACLU and others are concerned that Echelon may be used without a court order to intercept communications involving Americans. The Foreign Intelligence Surveillance Act prohibits interception of certain communications for intelligence purposes without a court order unless the Attorney General certifies that certain conditions are met. These conditions include a limitation that “there is no substantial likelihood that the surveillance will acquire the contents of any communication to which a United States person is a party.”

Echelon supporters know that communications surveillance is successful in gathering enemy intelligence and was a key to the success of the allied military effort in World War II. They also argue that tragedies such as the September 11,2001, attack and the bombing of the federal building in Oklahoma City are proof that such a surveillance system is necessary to forewarn authorities and potentially prevent major terrorist activities. In that regard, the United States agreed to share highly classified material from Echelon with the Spanish government to aid in its battle against the Basque separatist group ETA. As a result, the Spanish are now receiving decoded intercepts relating to the ETA’s plans for terrorist operations.

Questions:

a.      Are you for or against the use of the Echelon for eavesdropping on electronic communications? Why or why not? Is your opinion affected by the September 11,2001, terrorist attacks?

Answer:
I’m against on using Echelon for eavesdropping on electronic communication even though we all know that now a day we are in high modern technology but we should not depend on it, it’s better to use and have the human intellectual rather than electronic technology and all that happening today is a result by all what we did.  

b.     Develop a set of plausible conditions under which the directors of Echelon would authorize the use of the system to listen to specific electronic communications.

Answer:
Under the United States on which they use Echelon eavesdropping to intercept communications involving Americans. It is successfully in gathering enemy intelligence and was a key to success of the allied military effort in World War II.

c.      What sort of expanded or new capabilities might Echelon have 10 years from now as information technology continues to improve at a rapid pace? What additional privacy issues might be raised by these new capabilities?

Answer:
The new capabilities might Echelon have 10 years from now as information technology it’s continues to improve the modernization that surely can bring us to progressive stage through the help of technology, all problems can be easily solved but all of this can affect our privilege and privacy. Like in every act that we did we can never hide it out.