2.1+Business+and+employment

Business, leisure 2. Identify the main stakeholders to the IT system. Google Inc., users in the US. 3. Identify one ITGS social/ethical concern in the article. Reliability, security. 4. Describe ITGS terminology and systems. Boutiques.com : It is like amazon or ebay, and it directs shoppers to site where it can be purchased. Merchants pay them if the shopper buy the goods or click on it to learn more about it. 5. If possible, describe a solution to the concern (issue). Because it is on the internet, attention has to be paid to the issue of reliability. If any users buy anything, they would need to pay online by their credit cards, and some may feel reluctant to give credit card information online. To diminish this issue, Google will have to ensure a secure system where datas of each customers are kept safe and not misused. || 2.1_online_bus || - Business and employment 2. Identify the main stakeholders to the IT system. - JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple. 3. Identify one ITGS social/ethical concern in the article - Intellectual property 4. Describe ITGS terminology and systems. - Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device. - Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work. The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose. Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents’ rights. These pirated apps are Chinese –based language apps which plays a role in delaying the notice of the copyright infringement. 5. If possible, describe a solution to the concern (issue). Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies worrying about piracy. || 2.1 online business || Business and Employment- Online business 2) Identify all ITGS terminology and phrases (IT and social/ethical). Applications, Internet, UID, network, web, software developers, policy, analytics services, 3rd parties' applications. 3) Describe one ITGS social/ethical concern in the article. Privacy is the concern in this article because some software developers behind outside applications popular in the online community were "inadvertently" sharing user identification numbers. 4) Describe the relationship of the main stakeholders to the IT system. The main stakeholder which is the Ad networks is sharing identifying information about users with advertising and Internet tracking companies. 5) Explain the relationship between the IT system and the social/ethical issue identified in question 3. Facebook (IT system) modified its policy to forbid user identification data from leaving third-party applications and for such information to remain confidential if used by analytics services connected to programs (privacy). 6) Discuss at least one problem that relates to the impacts of the social/ethical issue. The problem here is that all of the 10 most popular applications on Facebook were transmitting unique user ID numbers to outside companies which violates Facebook's policy: data received from Facebook, including UIDs, cannot be shared with data brokers and ad networks. 7) Evaluate one solution that addresses the problem identified. Facebook user should have a choice on whether or not to allow applications to get their UID. Facebook should also tighten their policy and make it harder for Ad networks to share UID with third party applications. || 2.1_bus_emp || Doing everything on the cloud is efficient in a way that we can work on from anywhere anytime as long as we have internet connection. However, when we don’t have good internet connection, there is nothing we can do since everything we have done is stored on the cloud. . Internet data storing plans might also be an obstacle while operating on the cloud because the costs increase as more data is wanted to be stored on the cloud. Moreover, The cloud is not invincible to attacks so your data is not 100% safe. Having a backup saved on a physical hard drive is a must, cause you can’t rely too much in the cloud (look what happen to Amazon and Sony). || 2.1_business || Business and employment 2. Identify the main stakeholders to the IT system. Gucci, employees 3. Identify one ITGS social/ethical concern in the article. Security 4. Describe ITGS terminology and systems. Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted. http://www.webopedia.com/TERM/V/VPN.html Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. http://www.wisegeek.com/what-is-computer-hacking.htm Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer. http://www.webopedia.com/TERM/V/virtual_server.html E-mail Server – A computer server that acts as the supplier and sender of e-mails in the network. Ecommerce – Electronic commerce, business to sell and buy online electronically. Identity Theft – The stealing of and ID, or impersonating a fake person. 5. If possible, describe a solution to the concern (issue). Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company’s financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system. || 2.1_bus_emp || One of the issues is that Amazon need to reconsider the contracts that cover cloud services such as how much to pay for backup and recovery services, including paying extra for data centers in different locations. The reason for this is because small businesses are less apt to pay for extensive backup and recovery services. The second issue would be many companies are relying too much on remote computers that are beyond their control. So they need to reconsider that also. The technical problem that interrupted computer services provided by Amazon told its customers and users that there may be a reliability problem with Amazon’s service in online computing in the cloud. Companies and businesses operation network now revolves a lot around these remote network systems, so this also affects how companies will reconsider their use of exporting their files and data as opposed to keeping them within the company walls. 2) Why is the cloud model gaining popularity? Because owning a data center is high maintenance and therefore expensive. By using the cloud model, companies are avoiding the costs and headaches of running their own data centers. They just simply tap in, over the Web, to computer processing and storage without owning the actual machines or operating software. Businesses can also save their time by outsourcing to the cloud to save having to keep track of running their own data centers. 3) List the problems that companies reported. Unable to access data Service interruptions Sites being shut down || 2.1_online_bus || AWS- The Amazon Web Services (AWS) are a collection of remote computing services (also calledweb services) that together make up a cloud computing platform, offered over the Internet byAmazon.com. The most central and well-known of these services are Amazon EC2 and Amazon S3. Iaas – infrastructure-as-a-service; a way to deploy a less reliable server, quickly and without human intervention. 2) Define and describe: Free redundancy- re-deploying your application in another data center or cloud service using on-demand resources instead of having an idle redundant data center. Rapid scalability- Scalability approach that doesn’t require access to AMIs that is stored on S3 or EBS. Instead, it uses the on-demand resources. This is when the system can withstand changes in transaction volume without major changes. Server failover- Virtual servers fail more frequently that physical servers, and when they do, there is less ability to recover them. Treat server failover the same way as scalability, just bring up a new server. Maintainability- Use a fully automated deployment and not a server configuration that is created manually to make it maintainability. Since, when a server configuration that is created manually and saved to a “golden image” has numerous problems such as: only the person who built it knows what is there, so if that person is gone, it can be time consuming to re-configure it. On the other hand, a fully automated deployment is not only a maintainable process, it also serves as documentation. 3) Explain each lesson and determine whether you agree or not with each one. Wrong lesson #1 The lesson where the infrastructure of the cloud is either not ready for its time to shine, or never will be. This is the lesson that explains that the infrastructure is still carried out on physical servers, just in remote areas where they are held in the physical data center in large numbers. These physical servers are still prone to downtime, so the infrastructure is just as ready as the physical servers are, just out of your reach to control properly. I agree with the lesson because the virtual servers run on physical servers inside a physical data center and all physical data centers have glitches and downtime. Wrong lesson #2 Amazon is not to be trusted. This is implying that from this one incident, Amazon cannot be trusted. However, Amazon is actually a very reliable cloud, the AWS cloud has been running for many years since 06, and there have been downtimes in the past, just not as big as the current one. So it can’t be said that they shouldn’t be trusted from this one incident. Agree. Just because of one major outage, doesn’t mean that Amazon is not to be trusted. Some data centers are run better than others, but they all have outages. Right lesson #1 Nobody is secure, infallible. This means that Amazon is not completely perfect, and will have no glitches whatsoever. I agree with this, because nothing is infallible. Everything is fallible. With all the complex system coding, there will be glitches here and there, but it just depends on whether there will be a failure large enough for the public to notice. Right lesson #2 Amazon is not the only IaaS provider, don’t be limited to just using Amazon’s service. Your applications will be able to run on many different cloud providers, and you can move it easily and quickly. Therefore, since no data center is infallible and outages are inevitable, use more than one cloud providers for risk mitigation. Right lesson #3 Cloud deployments must be automated and should take cloud server reliability characteristics into account to decrease the probability of server failover and increase maintainability. This means that when start-ups are moving to the cloud, or Amazon, and having their deployment process be automated, so it wouldn’t require any manual actions to carry out the process. This can be done through the scripts for the process. || 2.1_business ||
 * Strand 2.1 Business and employment ||
 * Date || Article || Comments || Tags ||
 * November 2011 || Google Jumps Into Fashion E-Commerce - WSJ.com || 1. Identify the area of impact the scenario relates to.
 * December 14th 2010 || Japanese Publishers Cry Foul on Pirated App Store Books || 1. Identify the area of impact the scenario relates to.
 * Out of date || Facebook tightens grip on user ID data - Yahoo! News || 1) Identify the area of impact the scenario relates to.
 * 3월.10 || Identity Theft Resource Center ITRC Fact Sheet 102 || 1) Select and list 5 guidelines you think are reasonable.
 * Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms.
 * Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers.
 * Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis.
 * Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose.
 * Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers. || 2.1_business ||
 * May 1 || How Google Chromebook Will Feel for Music Fans | Epicenter | Wired.com || 1) What are the problems with doing everything on the cloud?
 * 4월.11 || Former Gucci Employee Indicted For $200,000 Hack - International Business Times || 1. Identify the area of impact the scenario relates to.
 * 4월.11 || Amazon Malfunction Raises Doubts About Cloud Computing - NYTimes.com || 1) Describe the two issues that came up from the technical problems that interrupted computer services provided by Amazon.
 * 4월.11 || Learning The Right Lessons From The Amazon Outage || 1) Define: