Cyber bullying happens through the use if IT devices, especially through social networks. It has psychological effects on the person being bullied.
An eighteen-year old boy Carney Bonner can be an example of cyber bullying. Carney was cyber bullied when he was 14 years old. He received constant text messages saying 'go kill yourself' or 'you're nothing.' This kind of messages made Carney anxious restricting him from social life.
A possible solution to cyber bullying is parents educating their child about being safe online. Also, the person who is being bullied can consult to someone he can trust. Keeping it to yourself is very bad.
1. Identify the area of impact the scenario relates to.
Business and employment
2. Identify the main stakeholders to the IT system.
Gucci, employees
3. Identify one ITGS social/ethical concern in the article.
Security
4. Describe ITGS terminology and systems.
Virtual private network- a network that is constructed by using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internetas the medium for transporting data. These systems use encryption and othersecurity mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted.
http://www.webopedia.com/TERM/V/VPN.html
Hacking- the practice of modifying computer hardware and software to accomplish a goal outside of the creator's original purpose.
http://www.wisegeek.com/what-is-computer-hacking.htm
Virtual servers- a Web server, that shares computer resources with other virtual servers. Instead of requiring a separate computer for each server, dozens of virtual servers can co-reside on the same computer.
http://www.webopedia.com/TERM/V/virtual_server.html
E-mail Server - A computer server that acts as the supplier and sender of e-mails in the network.
Ecommerce - Electronic commerce, business to sell and buy online electronically.
Identity Theft - The stealing of and ID, or impersonating a fake person.
5. If possible, describe a solution to the concern (issue).
Gucci needs to be stricter to their employees. They need to closely monitor anyone that can access the company's financial system and any vital part. By doing so, employees would not even think of hacking the system. Moreover, educating their workers into not being tricked to activate any other fraud employee accounts. Also, improving the authorization system of employees to access information with biometrics may be helpful to increase the security of their data and network system.