Professional Documents
Culture Documents
List and describe the five moral dimensions of the Information Age that are
involved in political, social, and ethical issues. (Ch4)
Discuss at least three key technology trends that raise ethical issues. Give
an example of an ethical or moral impact connected to each one. (Ch4)
When confronted with a situation that seems to present ethical issues, how should you analyze it?
1.Identify and describe clearly the facts
2.Define the conflict or dilemma and identify the higher-order values involved
•Golden Rule: Do unto others as you would have them do unto you
•Immanuel Kant’s Categorical Imperative: If an action is not right for everyone to take, it is not right
for anyone
•Descartes' rule of change: If an action cannot be taken repeatedly, it is not right to take at all
•Utilitarian Principle: Take the action that achieves the higher or greater value
•Risk Aversion Principle: Take the action that produces the least harm or least potential cost
•Ethical “no free lunch” rule: Assume that virtually all tangible and intangible objects are owned by
someone unless there is a specific declaration otherwiseEx. copyrights, patents, and trademarks
Web bugs: Tiny graphics embedded in e-mail messages and Web pages
Spyware: Software downloaded onto a user’s computer—usually without knowledge—that tracks Web
behavior and reports that behavior to a third-party server
Technical Solutions
•Encryptinge-mails
•Makinge-mail or surfing activities appear anonymous
•Preventing client computers from accepting cookies
•Detecting and eliminating spyware
•P3P
Explain and give examples to the terms mashup and widget. (Ch5)
Widgets: small programs that can be added to Web pages or placed on the desktop to add additional
functionality(weather reports)
IT Infrastructure has 7 main components
Green computing is the environmentally responsible and eco-friendly use of computers and their
resources. In broader terms, it is also defined as the study of designing, engineering, manufacturing,
using and disposing of computing devices in a way that reduces their environmental impact.
GRID COMPUTING: Grid computing connect geographically remote computers into a single network
to combine processing power and create virtual supercomputer.
CLOUD COMPUTING: Cloud computing is a general term of anything that involves delivering
hostel services over the internet.
UTILITY COMPUTING: Utility computing is a model in which computing resources are provided
to the customer based on specific demand.
RESPONSIBILITY: Accepting the potential cost, duties and obligations for decision you make.
Disaster recovery is one of the things that is easy to explain abstractly and difficult to understand at the
real-world level of practice. We will focus particularly on situations involving the restoration of data
availability
However, you can make backup data available by bringing new servers online to accommodate this by
simply keeping the backup data servers ready to go into production mode for immediate notification.
A more efficient approach would be to keep the backup data server images at hand, then gather new
virtual servers in the cloud based on those images when you need them.
a disaster that destroys part or all of the data center or all servers and disks in it. Such a situation is
possible, though rare. The best way to prepare your business for disaster recovery is to ensure that you
have external copies of your data.
A data disaster that can cause your business to fall is when someone intentionally sabotages data.
The critical step in preparing for such a disaster is to have backup copies that go back enough to allow
you to recover your data using a version that you know is safe.
CHAPTER4- CASE1: BIG DATA GETS PERSONAL: BEHAVIORAL TARGETING
The technology advancement can be double-edged sword. It brings benefits and opportunities to some of
the users but it also bringing troubles to some of the users. The web has created new opportunities and
challenges regarding privacy issues.
Business benefits:
After the presence of behavioral monitoring, companies can predict what customers want and what they
are looking for, so that they can advertise on the web page that the customer always visits. This helps to
make advertising more effective and increase the company's profits.
Benefits to people:
Behavioral monitoring not only benefits the business, but also benefits people. For examples, you have
researched a phone on the Internet and its features. So, when it catches up with our web surfing history,
there will be many pop-up ads about the phone we're looking for.
- The private information will be missing such as the contents of shopping carts, location information or
login information.
-Website do not protect your information on internet.
-The scammer and spammer will be increases because no protection.
-Anonymous people or fake account will be free.
CHAPTER4- CASE2: MONITORING IN THE WORKPLACE
Now users have adapted to information technology and have learned to use the new technology to spend
more time on these media devices. Based on research, poor families spend less time with their children
than families with more use of computers, phones and television to use media.
Because those who are not in good shape spend less time using these technologies, which ultimately
leads to a digital division between the rich and the poor.
How serious a problem is the “ new” digital divide? Explain your answer.
Because now parents are spending more time to control the use of technology and at the same time
increasing the health concerns associated with the excessive use of technology. With the use of Internet
smartphones and other modern technologies, the increasing emphasis on visual processing rather than
critical thinking and information retention affects our cognitive patterns
How do the concepts of capacity planning, scalability, and TCO apply to this
case? Apply these concepts both to Amazon and to subscribers of its
services.
- Amazon must plan its future needs to be capable of providing suffienct computing power for both AWS
and Amazon retail services.
- Scability relates to both Amazon and AWS subscribers. Amazon must be able to provide its customer
with services that are scable, as it claims to do on its website.
- Amazon must provide hardware capacity planning and scability, bear the total TCO of its services
while also need to maintain the profitability of the company.
What kinds of businesses are most likely to benefit from using cloud
computing? Why?
Cloud computing has begun to take off in the business World. Zynga is a good example of a company
using cloud computing to improve its business in a new way.
More cost-effective - Application
Data lost prevention - Callaborative business.