Huwebes, Pebrero 26, 2015

Intellectual Property and Software Development


Chapter 6

1) You have been asked by the manager of software development to lead a small group of software developers in an attempt to reengineer the latest release of the software by your leading competitor. The goal of the group is to identify features that could be implemented into the next few releases of your firm software. You are told that the group would relocate from the united states to the island of Antigua, in the carreibbean sea, to “reduce the risk the group being destructed by the daily pressures associated with developing fixes and enhancements with the current software release.” What sort of legal and/or ethical questions might be raised by the reengineering effort? Would you consider
taking this position?

Answer: Reengineering is a process of software development which is done to improve the maintainability of a software system  and in technical definition it is the examination and alteration of a system to reconstitute it in a new form. Does the reengineering really worth for the time and effort and does relocating is necessary.  For me I consider taking that position because it is an opportunity to show our skills and gain knowledge from it.

2) You have procrastinated to long and now your final paper for your English course is due in just 5 days- right in the middle of the final exam week! The paper counts for half your grade for the term and would probably take you atleast 20hrs. Of research and write. Your roommate, an English major with a 3.8GPA, has suggested 2 options. (1) he will write an original paper for you for $100, or (2) he will show you 2 of 3 “paper mill” websites, from which you can download a paper for less than $35. You wanted to do the right thing, but writing the paper will take away from the time you have available to study for your final exam in 3 other courses. What would you do?

Answer: In the two option that’s being suggested by my roommate I will not choose any of them. For me, I would rather do the right thing than downloading the research paper that he/she wanted me to do and I will not also let him/her to right my research paper. I manage my time to accomplish my research paper.
  
3) You are beginning to feel very uncomfortable in your new position as a computer hardware salesperson for a firm that is the major competitor of your previous employer. Today for the second time, someone has mentioned to you how valuable it would be to know what the marketing a new product development plans whereof your ex-employer. You stated that you are an able to discuss such information under the non disclosure contract signed with your former employer, but you know your response did not satisfy your new co-workers. You fear that the pressure to reveal information about the plans of your former company is only going to increase over the next few weeks. What do you do?

Answer: As an ex-employee in the other company it is the right thing to do for not giving the information. I will also explain to my co-worker that the information I have is still confidential and covered by the Trade Secret Law which state that Trade secret law is a branch of intellectual property law that is concerned with the protection of proprietary information against unauthorized commercial use by others. In the United States, misappropriation of trade secrety is is forbidden by the Uniform Trade Secrets Act (UTSA) and the Economic Espionage Act of 1996

4) You have been asked to lead your company’s new competitive intelligence organization. What would you do to ensure that members of the new organization obey applicable law and the companys’ own ethical policies.

Answer: As a leader to ensure that the member of my new company organization obey the applicable law and company ethical policies I will conduct training for them and I will discuss also the punishment in every disobedient and unethical works in my company.

5) You are the vice president for software development at a small, private firm. Sales of your firms products have been strong, but you recently detected a patent infringement by one of your larger competitors. Your in-house legal stuff has identified 3 options: (1) ignore the infringement out of fear that your larger competitor will file numerous countersuits; (2) threaten to file suite, but try to negotiate an out-of-court settlement of an amount of money.

Answer:  In the option given, I will choose second option “threaten to file suite, but try to negotiate an out court settlement of an amount of money. And as a vice president I will not consider such thing that is being done without the consent of  the inventor. And Patent infringement is the act of making, using, selling, or offering to sell a patented invention, or importing into the United States a product covered by a claim of a patent without the permission of the patent owner.


Chapter 7

1. Apple Guidelines for App Approval
Apple’s App Store has been a huge success ever since it was launched in 2008. As of the end of 2010, the app store offered more than 250, 000 applications available for sale to owners of apple, iPhone, iPad and iPod devices, with more than 6.5 Billion downloads since it opened.
Before software applications can be solved throught the App Store, they must go through a review process. Apple has been accused by some of using clandestine and capricious rules to reject some programs and thus blocking them from reaching the very large and growing market of iPhone, iPad, and iPod touch users. One application developer complained: “ if you submit an app, you have no idea whats going to happen. You have no idea it’s going to be approved or if it’s going to be disapproved.” The developers of an app called “South Park” complained that their app was rejected because the content was deemed “potentially offensive ,” even though episodes of the award-winning animated sitcom are available at the Apple iTunes  Store. In September 2010, after more than two years of complains, apple finally provided applications developers the guidelines it uses to review software.
Most guidelines seem to be aimed at ensuring that Apple users can only access high quality and non-controversials Apps from its Apps Store. Some of the Apple guidelines are clear and their rationale is easy to understand, such as “ apps that rapidly drain the device’s battery or generate excessive eat will be rejected.” However, other guidelines are unclear and highly subjective, such as “ we will reject apps for any content or behavior that we believe is over the line.” What line, you ask? Well, as a Supreme Court Justice once said ,“ I’ll know it when i see it. ‘ and we think that you will also know it when you cross it. (“ I know it when I see it” was the phrase used by U.S Supreme Court Justice Potter Stewart to describe his ability to recognize rather than to provide a precise definition of hard core pornography and his opinion in the cae Jacobellis v. Ohio in 1964.)
The electronic frontier foundation believes that while the guidelines are helpful, in some cases apple is defining the content of third-party software and placing limits on what is available to customers of Apple’s App Store.
By way of comparison, Google places few restrictions and developers of software for its competing Android Marketplace. However, there have been many low-quality applications offered to Android Marketplace customers, including some that include unwanted malware. Indeed by early 2011, google had pulled 21 Android applications from its Android Marketplace because, once downloaded, the applications not only stole users’ information and device data but also created a back door for even more harmful attacks. Apple’s decision to finally share applications guidelines may have been an attempt to combat the rapidly increasing popularity the android. It may also have been a response to a U.S Federal Trade Commissions investigations of a complaint for Adobe concerning Apples banning of the flash software from devices that run using Apple’s iOS operating system (Adobe Flash player is a browser-based applications that runs in many computer hardware/ operating system combination and support the viewing of called “rich, expressive applications,” content, the videos across screens and browsers .)

Discussion Questions:

1. Should Apple conduct extensive screening of Apps before they are allowed to be sold on the App Store? Why or why not?

Answer: Yes, the apple should conduct extensive screening for their apps before they sold it in the app’s store to avoid harmful apps that can give chances to the malware and other viruses to attack the apple products.

2. Do research to determine the current status of the FCC investigatin of Apple for banning use of the Adobe Flash software and devices that use the iOS operating system.

Answer: Adobe's Flash Surrender Proves Steve Jobs And Apple Were Right All Along With HTML5
This article is the fifth in a series, “The Future of Apple,” designed to give investors appropriate insights on the future of the iconic company.  After the passing of Steve Jobs, investors face uncertainty in shares of Apple (AAPL).  Will the stock next hit $100 or $1,000?
The fifth article in this series was scheduled to provide more evidence of why patents will help Apple make billions from Google Android. In view of the breaking news on Flash, this article has taken precedence.  The previously scheduled article will now be the sixth article in this series.
Flash is a multimedia platform produced by Adobe (ADBE).  Flash has been the standard for adding video, interactivity, and animation to websites.  It has been widely accepted that Flash enriches the web experience for the user.
The popularity of Flash is obvious from the following statistics produced by Adobe:
98% of enterprises rely on Flash Player.
85% of the most used sites use Flash.
75% of web video is viewed using Flash Player.
70% of web games are made in Flash.
In 2010, Steve Jobs had the courage to question the applicability of the Flash technology going forward.  Jobs made waves and enemies when he banned Flash from use on all iOS devices.  iOS is the operating system from Apple.  Jobs was almost unanimously criticized by the industry.
Jobs took a big risk banning Flash, which also precluded users of Apple devices from seeing video and animation on most sites.
Steve Jobs championed an alternate technology called HTML5.  Revisiting an open memo that Jobs wrote is instructive.  Here is the memo.
Thoughts on Flash
Apple has a long relationship with Adobe. In fact, we met Adobe’s founders when they were in their proverbial garage. Apple was their first big customer, adopting their Postscript language for our new Laserwriter printer. Apple invested in Adobe and owned around 20% of the company for many years. The two companies worked closely together to pioneer desktop publishing and there were many good times. Since that golden era, the companies have grown apart. Apple went through its near death experience, and Adobe was drawn to the corporate market with their Acrobat products. Today the two companies still work together to serve their joint creative customers – Mac users buy around half of Adobe’s Creative Suite products – but beyond that there are few joint interests.
I wanted to jot down some of our thoughts on Adobe’s Flash products so that customers and critics may better understand why we do not allow Flash on iPhones, iPods and iPads. Adobe has characterized our decision as being primarily business driven – they say we want to protect our App Store – but in reality it is based on technology issues. Adobe claims that we are a closed system, and that Flash is open, but in fact the opposite is true. Let me explain.
First, there’s “Open”.
Adobe’s Flash products are 100% proprietary. They are only available from Adobe, and Adobe has sole authority as to their future enhancement, pricing, etc. While Adobe’s Flash products are widely available, this does not mean they are open, since they are controlled entirely by Adobe and available only from Adobe. By almost any definition, Flash is a closed system.
Apple has many proprietary products too. Though the operating system for the iPhone, iPod and iPad is proprietary, we strongly believe that all standards pertaining to the web should be open. Rather than use Flash, Apple has adopted HTML5, CSS and JavaScript – all open standards. Apple’s mobile devices all ship with high performance, low power implementations of these open standards. HTML5, the new web standard that has been adopted by Apple, Google and many others, lets web developers create advanced graphics, typography, animations and transitions without relying on third party browser plug-ins (like Flash). HTML5 is completely open and controlled by a standards committee, of which Apple is a member. Apple even creates open standards for the web. For example, Apple began with a small open source project and created WebKit, a complete open-source HTML5 rendering engine that is the heart of the Safari web browser used in all our products. WebKit has been widely adopted. Google uses it for Android’s browser, Palm uses it, Nokia uses it, and RIM (Blackberry) has announced they will use it too. Almost every smartphone web browser other than Microsoft’s uses WebKit. By making its WebKit technology open, Apple has set the standard for mobile web browsers.

3. What do you think of Apple’s guidelines that say it will reject an App for any content or behavior that they believe is over the line? Could such statement be construed as a violation of the developer’s freedom of speech? Why or why not?

Answer: For me that statement doesn’t   violate the developer freedom of speech because the statement can have different meaning. Maybe the meaning of the over the line are those words that is not good or bad.

Martes, Pebrero 24, 2015

Privacy and Freedom of Expression

                                                                               Chapter 4

4. As the information systems manager for a small manufacturing plant, you are responsible for anything relating to the use of information technology. A new inventory control system is being implemented to track the quantity and movement of all finished products stored in a local warehouse. Each time a forklift operator moves a case of product, he or she must first scan the product identifier code on the case. The product information is captured, as is the day, time, and forklift operator identification number. This data is transmitted over a local area network (LAN) to the inventory control computer, which then displays information about the case and where it should be placed in the warehouse.
The warehouse manager is excited about using case movement data to monitor worker productivity. He will be able to tell how many cases per shift each operator moves and he plans to use this data to provide feedback that could result in pay increases or termination. He has asked you if there are any potential problems with using the data in this manner and, if so, what should be done to avoid them. How would you respond?

Answer: As a systems manager I is responsible for the computer systems within a company. They oversee installation, ensure backup systems operate effectively, and purchase hardware and software and how the system can help you . As a systems manager we are task to develop an inventory control system that could monitor the quantity and movement of all finished product stored in a warehouse .And if the warehouse manager used the system to monitor the worker productivity it could arise some problems. But if he the warehouse manager would really insist, we can put some additional features that would know the worker productivity and those feature could minimize the problems.

5.You have been ask to help develop a company policy on what should be done in the event of a data breach, such as unauthorized access to your firm’s customer database, which contains some 1.5 million records. What sort of process would you use to develop such a policy? What resources would you call on?

Answer:  A data breach is the intentional or unintentional release of secure information to an untrusted environment. Other terms for this phenomenon include unintentional information disclosure, data leak and also data spill. In this event I would follow the correct/proper security procedures in developing the policy because failure to follow this will result to data breaches of large databases.

6. You are a new brand manager for a product line of Coach purses. You are considering purchasing customer data from a company that sells a large variety of women’s products online. In addition to providing a list of names, mailing addresses, and email addresses, the data includes an approximate estimate of customer’s annual income based on the zip code in which they live, census data, and highest level of education achieved. You could use the estimate annual income ?

Answer: The advantage of this it can give them a less time consuming because if they come up a new product because the information of it would automatically be sent to those customers. The disadvantage of this is that if there are only few customer’s data that they’d buy, there are also few people that could know their new product and not all customer that receive the advertisement product will automatically buy those product.

7.Your company is rolling out a training program to ensure that everyone is familiar with the company’s  IT usage policy. As a member of the Human Resources department, you have been asked to develop a key piece of the training relating to why this policy is needed. What kind of concerns can you expect your audience to raise? How can you deal with the anticipated resistance to the policy?

Answer: As a member of the human resources department, I would not expect that all the employees would all accept the said policy, but I would give further explanations that this policy could help them to understand and perform ethically that can make them productive in their work.

                                                                                 Chapter 5

1.A former high school classmate of yours who has returned to China, emails you that he has offered a part-time job monitoring a Chinese Web site and posting comments favorable to the government. How would you respond?

Answer: As a friend I would suggest that she should think his/her decision all over and over again before accepting the job that is being offered to her/him. And if he/she accepts that job and that job required monitoring a web site and he/she keeps posting comments favorable to the government, I would recommend that he’ll post comments that could not offend the other party that can make this government fight with each other. Even though we have the thing we called freedom of expression we should also consider other things before doing something for our job.

2.Your 15-year-old nephew exclaims “Oh wow!” and proceed to tell you about a very revealing photo attachment he just received in a text message from his 14-year-old girlfriend of three months. He can’t wait to forward the message to others in his school. What would you say to your nephew? Are further steps needed beside a discussion on sexting?

Answer: As Aunt, I would tell my nephew that what he planning to do was unethical that it could destroys someone’s life and not only his girlfriend life but also his life. Also I would discuss to him the risk if he do such an act that it may cause his girlfriend to encounter social consequences. Images can easily escape their control through being shared more broadly than they had anticipated. This can have a long-term impact on their digital reputation. That image can also potentially be used for cyber bullying or cyber stalking, or they may attract unwanted attention from others. And I will discuss to him that in all personal matter (like conversation, images, etc.) are not all allowed to share to everyone and he should also ask permission.

3.A college friend of yours approaches you about an idea to start a PR firm that would specialize in monitoring the internet for “Bad PR” about a company and “fixing” it. One tactic the firm would use is to threaten negative posters with a libel lawsuit unless they remove their posting.  Should that fail, the Pr firm will generate dozens of positive postings to outweigh the negative posting.  What would you say to your friend about her idea?

Answer: I am going to tell her that her idea is brilliant for it has a very good effect to the firm and also I’m going to tell her the ethical constrains of her ideas.

4.You are the computer technical resource for country’s public library system. The library is making plans to install internet Filtering Software so that it will conform to the children’s Internet Protection Act and be eligible for federal funding. What sort of objections can you expect regarding implementation of internet filters? How might you deal with such objections?

Answer: Internet filtering refers to blocking undesirable content on the Internet. It helps you filter and deny access to any unwanted material. The person who sets up the filter provides a system to block certain data. It may include advertising, a virus, file transfer, or other offensive material. When a user makes a request for a Web page that has been blocked, the Internet filter keeps the request from being completed. It either blocks it completely or redirects it to another location. But there could some objections to it, like the filter will accidentally block content that shouldn’t be blocked, there’s far too much content to block effectively and a lot more. In this, internet filtering could help secure the children to things that are not suitable for their age, especially to those sites that can give bad influence to them. We already know that our society now is very dependent in internet, so are kids that are addicted on online games and browsing websites.

5. Imagine that you received a hate email at your school or job. What would you do? Does your school or workplace have a policy that covers such issues?

Answer: For the one who send hate emails to me the first thing that I would do is to ask who it is he/she and what I have done wrong to him/her that makes them hates me, secondly I would tell my parents about the emails. And if in school I would tell my teachers or ask help from the school about it, so that the one who’ve been sending the emails could be tracked. Hate email are also some kind of bullying.

6.A worker confides to you that he is going to begin sending emails to your employer’s internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the message “Anonymous”. Your friend is afraid of retribution from superiors but wishes to call attention to instances of racial and sexual discrimination observed during his five years as an employee with him. What would you say to your friend?

Answer: As a friend and also an employee I would say that what he/she did was right for me because he’s just protecting herself and only herself but also the other employee from the people whom could hurt or do some bad things to him or even to others. Also he did was right that he inform the management about the sexual discrimination happening in their workplace.