Skip to main content

Home/ ITGS News/ Group items tagged 2.1_bus_emp

Rss Feed Group items tagged

Mariam B

Another Day, Another RFID Trial-Debate about using RFID on DVDs - 0 views

  •  
    This article discusses the issue of individual security and invasion of ones privacy through the use of RFID tags. With RFID tags on almost ever retail item, customers who are main stake holders, are questioning the motives of these tracking codes. A major item that is being tracked is a DVD from when it is first put into its cover and sent to the store, till the costumer purchases it. However the question remains, What is the purpose of this? Is it necessary to track how the costumer uses the items that they buy? Other stake holders include the large business corporations such as Walmart, who use these RFID codes to profit from studying the purchases and trends in other stores and areas. Additionally another stakeholder that is seen as a threat is the government who may eventually be able to spy or track down individuals based on these RFID codes on the items that they purchase. This issue relates to business and employment because companies are able to economically profit through this even though the individual privacy remains a threat. These RFID tags allow businesses to profit because they can use the codes to efficiently organize the purchasing of stock and selling of items. The RFID can be considered a network that allows the hardware which is the actual code to work. Without the network tracking and creating the code, the device is unable to function. Although the customer is able to open the wrapper such as in the case of buying a DVD and throw it away, the thought still remains of what will happen in the future with these tags? There is constant dispute and consideration on how the alternate user who is the customer that purchases these items, may become a victim of privacy invasion.
Daniell S

Security risk found in new credit cards - Technology - International Herald Tribune - 1 views

  •  
    In this article it talks about the idea of putting RFID, or Radio Frequency Identification technology into a credit card. This can be both a good thing and a bad thing. It would be a good thing because it would totally change the way a business could work. It would decrease the amount of time a person spends in a store. A person could simply walk in and out of the supermarket with the items they wanted and the amount of money would be charged directly to the persons credit card. However, this could result in an increase in credit card abuse. with RFID technology the signal could be picked up by any radio frequency. This can result in identity theft, and credit card fraud. This is a a violation of the social and ethical issue Security. The stakeholders in this situation would be the credit card users, and the companies issuing the credit card. The users would become angered that their credit cards could be maxed out without them using it more than once and the companies could be sued for each credit card they issued.
Madeline Brownstone

Tieto Gets Outsourcing Contract From Nokia Siemens - WSJ.com - 3 views

  •  
    This article is primarily concerned with the announcement of two companies, Tieto and Siemens, joining in an outsourcing contract. According to the article this is done in order to increase the business benefits. In the perspective of business, the move is more profitable, and allows both companies to expand globally in term of the audience. The two companies are well known, especially for certain groups of people, so by joining some aspects of their business, they will be able to join their individual audiences. By the companies working together and using employers from both businesses then they will be able to generate a larger acceptance and recognition. Globalization makes this possible, and optimizes the profit and efficiency of both companies. However, it can lead to problems involving the jobs of the people who work at either of the two companies. Tieto, specifically, is using forty of the workers from Nokia Siemens. This means that jobs will be lost from the people who work at the original company. Instead of giving the jobs to people at the headquarters, the jobs will go to the people off site. This will benefit the companies, as it is the most beneficial business scenario, but will take a toll on the lives of the unemployed. However, the amount of jobs that are being added in one company and taken away in the other company is very small in comparison to a much larger company that needs to expand greatly. The use of VOIP and the internet itself allows the smooth interaction between the two companies and with the growth of IT, more and more methods will be introduced for the companies to interact without leaving their respective office. Because Nokia and Tieto have been partners for several years, they have been utlizing these methods of communication that are different from having everything on site and going to meetings in person. Yet, they have decided that the partnership, using outsourcing, is the best possible way for both companies to grow. Thus, outs
Mariam B

Intel and J.P. Morgan Chase to Expand Indian Operations - 1 views

  •  
    Intel is a company that develops processing technologies such as chips that are put into computer hardware. However recently they have decided to outsource certain necessary business operation to India instead of in the US. Additionally Intel has agreed with an investment banker named Morgan Chase, to invest about 1 billion of the company's money into this plan. Intel already has many of it's workers in India however wants to expand the business by increasing its workers within the company. Workers will be needed to help expand the company a long with workers both qualified and graduates due to the increased opportunities and positions. The reasoning as to why Intel continues to offshore work to India is because they are able to find high quality workers and can get work done at cheaper/lower costs. The organization affected mainly is Intel who is able to make a profit through investing in the workforce in India. Additionally the people who are in India that are given the jobs are able to benefit because more jobs are becoming available. The negative side to this is that, they are not paid as much as Intel workers in the US. Additionally another stakeholder is the U.S government itself that frowns upon the idea of offshoring jobs due to the knowledge that by doing this, job oppertunities available to Americans will decrease. The social and ethical issues and impacts of these are related to globalization and its impacts on both the country (India) and the United States. Although workers are given jobs the pay that they receive is not as much as a worker in the U.S would. This is done for the economic benefit of the country Intel itself, allowing them to create a greater profit by off shoring jobs to India. However those who are highly qualified and trained are able to find a job at Intel that matches their level of training. Thus they become employed if they need money. A positive impact to globalization is getting rid of the digital divide in a sense because fr
nicholas n

India in Dire Need of Civil Engineers - NYTimes.com - 1 views

  •  
    This article addresses some of the problems with out sourcing in India. It was an interesting article since normally we here how america suffers from outsourcing, but this article addresses some of the problems that come with the country that obtains the outsourced jobs. The stakeholders are the the Indian government who wish to improve the infrastructure. The workers of India who go to IT related jobs because they pay more money, even if they majored in other fields. The companies that our outsourcing jobs in the first place, and one could consider the colleges. The primary ethical issue is globalization, this issue concerns outsourcing itself(can't figure out another ethical concern). The primary IT system is software created by Indian workers
Elisavet M

Offshore Outsourcing's Next New Wave: How High? - 1 views

  •  
    The emergence of Business process outsourcing has transfigured the ways in which companies in developed nations, expand their services globally to businesses in developing nations. Although the cost for labor to support the extension of company engagement in third world countries is acknowledged as being relatively low (a beneficial advantage to most established business corporations), it has come to the attention of the participants (Businesses of developed countries) that it is of major importance to fully recognize the boundaries of business practices, culture, and level of intellectuality and experience within the hired portion of developing nation populace. Companies of information technology services, such as Dell, have come to form heightened concern about such global barriers, having attempted to transition call center labor in India and then deciding upon the withdrawal of such communication employment (due to the lack of consideration of business and cultural differences that impact business results). Based upon the data provided by NASSCOM (Indian software and services trade association), the conclusions drawn positively indicate that Business offshore processing has an overwhelming potential to grow in the next couple of years; although there is much room needed for consistent business growth (developing businesses, such as BPO in India, must rise at least 30 percent), the progression lies mainly upon the driving increase of skillful and educated information technology workers within India. The stakeholders, Information technology businesses in developed nations, surely stand by their statement supporting the increased use of qualified employers in the business environment of developing nations' companies (considered to also be additional stakeholders), for this will lower the cost involved in the off shoring process. The main social and ethical considerations lie upon reliability of developing nations'
  •  
    My entire post was not posted on diigo, so here is the continuation: business functions, as developed countries' companies increasingly form reliance and trust upon the promise of the elevating skilled labor class, for it is a major component that supports the foundation of software and hardware services and networks on a globally connected basis. The reliability built within the business partnerships and bonds established in two differing cultural environments, is founded upon the agreement of mutual advancement and progress in regards to the establishment of skill by developing nations' employees. Although, the system of globalization and cultural diversity surface the obstacle of continuous intellectual and business development for developing nations, it is the gesture of surpassing cultural and business ideology that will truly trial both stakeholders involved.
Noreen C

Keeping Secrets WikiSafe - NYTimes.com - 0 views

  •  
    WikiLeaks has led to several problems related to privacy and security of government data. The legal debate weighs whether the posting of this data is against Constitutional laws, but many others in the Government fear the magnitude of this problem. Some people ask, what would the founding fathers have done....but the world of the internet is a whole other ball field. The latest on the WikiLeaks threats claim that Assange still has more documents which were uploaded onto the website. However, the files are encrypted. Many people have access to these files, but because they are in cipher text, they cannot be read. As soon as Assange, or anyone who has access to the information publishes the Public Key, the encrypted documents will be decoded, using the same software that Assange used to encrypt it. If these documents have material in them that could threaten national security, then the USFG will have a stronger case against Assange on the basis of a privacy breach. Because of the high security, and the reliability of the encryption software, these documents have little value at the moment. The Obama Administration is clearly keeping an eye on the situation, because they wish to protect the privacy of the documents, but also because they want to find a way to take down the documents before they create damage. However, there is an extreme level of difficulty in decrypting the data, which is protected by a mathematical algorithm specific to the software that Assange initially used. The intersection of the privacy of the Government and the reliable security that Assange used comes to show that the IT world is constantly expanding, beyond the prediction of one business, or even the Government. But these Assange and the USFG aren't the only ones involved. Many people around the world are trying to attain access to these documents, primarily in the US in order to understand national secrets that have been held back from the public. The internet as a form of media has transfo
  •  
    continued.....transformed the notion of what is private and what isn't, and clearly now more than ever privacy needs to be secured. Maybe the USFG should look into some high security protocols such as encryption, and their data files wouldn't be intercepted and posted on the internet.
nicholas n

BlackBerry denies India email access deal as struggle continues | Technology | guardian... - 0 views

  •  
    This is a news report that RIM(research in motion ) I denying claims that India is now able to access the messages that many send through RIM secure network. This access includes company messages. However RIM refutes these claims and states they don't have access to any of this information. This is one part of a greater story India's government is not the only government that had problems with RIM due to lack of equality of service and the fact that RIM has the best encryption on their messages. There are many stakeholders such as RIM who are running a business that desires to make a profit and realize on their reputation on security, any company that uses blackberry service. The government that wants to have access to the messages to protect their national security, and finally the average consumer that loves using blackberry for their everyday lives. for the primary stakeholder which is RIM social and ethical issues are security, and reliability and integrity. Security refers to the protection of the blackberries encrypted network. The reliability and security concerns RIM's reputation for their secure networks. the primary scenario in this case is business and employment from various points of view, and the IT system is the blackberry cell phones.
Elisavet M

Data Security Laws Seem Likely, So Consumers and Businesses Vie to Shape Them - 0 views

  •  
    During 2005, political organizations advocated for strict laws implementing data security enforcement, as rising concerns stemmed out of alarming statistical studies and research, revealing identity theft, credit card frauds and hacking as emerging and terrorizing practices overtaking much of the internet realm. This article introduces the beginning of the rise in public awareness, as technology strongly began to redirect the business world into another more digital phase. It was during that year, the primary stakeholders, also known as the businesses ( participants of e-commerce that stored, verified and utilized private consumer data), vocalized their needs clarifying their desire for the creation of constraints in regards to the consequences or negative implications of passing certain bills (for data security). The past exemplifies the various influences the introduction of data security measures, passed by the government legislatures, had upon newly initiated businesses; among the most significant implications discussed were: the need to build a secure database for reliable storage of clientele digital data with the utilization of particular software as well as improving business organizational structure in order to maximize the rate of security notifications towards consumers based on a foundation of rigid security standards. Far from the adaptation to such implications, the political crisis of establishing solid ground for a new set of security data policies and standards became an overwhelming process for politicians, congress members in conjunction with consumer and data privacy groups that rivaled in attaining the responsibilities of passing the needed laws. The politicians (stakeholders, holding the role of administering governmental legislation to stabilize data security breaches), came into opposition with the concerns of many members of advocacy groups (stakeholders, holding the responsibility of supervising and publicly navigating the direction of th
  •  
    continuation: the adjusted standards enforced by politicians). The problem of adhering to the instruction of newly created laws motioning businesses to appoint data security officers, draft policies, to comply with policies and procedures involving giving access to files in business databases for the Federal Trade Commission to check comes into collision with what most online businesses want to go through the process of doing. However, with the issue of security surfacing future consumer problems, as security breaches become major forces threatening the safe entering of digitally encrypted information (such as credit card codes), many companies become increasingly aware of the needed adherence to the strict security data laws, in order to continue profiting financially in order to keep the rate of consumer trust and payment increasing.
Daniell S

Data Security Is No Longer an Option - 0 views

  •  
    This article starts off with the actions of a small travel site. This article speaks of the price they had to pay to upgrade the security. This company has to make big changes to their security in order to do business with larger companies. In this situation there are both positive and negative impacts. One big negative impact is the price to pay for this upgrade in security. In order to be on par with the security of higher level businesses smaller businesses have to pay large amounts of money to gain this security. This would require a lot of faith in the big businesses from the smaller business. As said in the article "The connection, and everything transmitted over it - financial, customer and product data - has to be secure and out of the reach of hackers, cyber thieves and even disgruntled employees." This shows how secure the website has to be. This is so that bigger companies can trust the smaller companies to handle business. However, through this impact can come a positive one. By having security equal to those of bigger businesses customers will have an easier time trusting the company. Another issue that comes up is reliability. A question that can be asked is whether or not the security is strong enough against hackers? This would give customers right to question whether or not this website would be trustworthy or not. In this situation the important stakeholders would be the bigger businesses and the smaller businesses. In order to do business both companies need to have the same level security. This would require one or both companies to upgrade their systems greatly to be on par with each other. Another important stakeholder would be the customer. The customer would need to know whether or not they could use the website without worrying too much about being hacked. If the customer knew the security was stable it would make them more comfortable about using it.
Kim T

iTunes warning as thousands of fraudulent accounts are auctioned online - 1/7/2011 - Co... - 0 views

  •  
    Purchasing songs, apps, movies, and etc on ITunes requires each user to have an ITunes account. Upon signing up for the account, a valid credit or paypal account must be entered to pay for any purchased items. These purchases are made using a SSL (secure socket layer) connection so that when the user sends their information to ITunes to set up an account, log in, or purchase an item, the information they are sending is encrypted.The sender is given a public key to show that he or she was the one sending the message and ITunes will get the private key. The data is encrypted using a code that will translate the data into a message incomprehensible to others if not decrypted using a private key. Once it has reached the ITunes database after being sent over the network, the private key will decode the message and proceed with the transaction.  However, the problem lies within the process of setting up an account. Many customers' itunes accounts are being hacked into and sold online to other people in China. Hackers are still able to find and intercept customers' information, such as their passwords or credit card number, and use it to sell to other people. Passwords may be too weak in some cases or authentication by the itunes store may be too weak. The issue of security is therefore involved as sensitive information can be accessed by others. The customers are affected since they are being charged for items that they are not purchasing. The company, Apple, is also affected negatively since their customers may not feel safe buying from them anymore and therefore losing business. Then there are the hackers who are benefiting in such a situation, profiting off of other people illegally.
1 - 11 of 11
Showing 20 items per page