1. Identify the area of impact the scenario relates to.
- Business and employment
2. Identify the main stakeholders to the IT system.
- JBPA, The Japanese Magazine Publishers Association, the Electronic Book Publishers Association of Japan, the Digital Comic Association, Apple.
3. Identify one ITGS social/ethical concern in the article
- Intellectual property
4. Describe ITGS terminology and systems.
- Apps: Apps is an abbreviation for application. An app is a piece of software. It can run on the Internet, on your computer, or on your phone or other electronic device.
- Copyright: a set of exclusive rights granted to the author or creator of an original work, including the right to copy, distribute and adapt the work.
The App Store is some kind of a database for iPhone, iPod touch, and iPad created by apple that allows users to browse, download and install app on their devices. Applications in an app store can vary in cost, from free downloads to quite costly ones, depending on who developed the application and its purpose.
Software Apps, E-books that are sold through the app store are pirated. This software is basically electronic books, similar to real life books, where its contents are stored online. This Japanese copyright infringement is done through software that is uploaded through the internet that can be downloaded for a price. However, the payment is delivered to the offender, not the original person who owns the contents' rights. These pirated apps are Chinese -based language apps which plays a role in delaying the notice of the copyright infringement.
5. If possible, describe a solution to the concern (issue).
Illegal distribution of copyrighted property should be banned. However, the massive infringe of the law is common in China. There should be more strict policy and laws in national level to reduce the number of these issues, such as measurement and specified steps of installing and removing application to satisfy companies wor
Android is widely accepted as being iOS' greatest rival, but, according to Dell SecureWorks security researcher Timothy Vidas, it has a host of issues that have made it a target for malware authors.
Poor permissions: the huge host of permissions that users must understand are driving them into information paralysis; they are choosing to ignore the warnings presented to them, and not considering whether they may be dangerous or unnecessary.
Open marketplace: Google Play does have an automated scanning program called Bouncer, but its effectiveness is as yet unknown. Therefore many Russian and Chinese alternative markets basically distribute 100 per cent malware
Inexperienced or malicious developers: if they don't have any malicious intent, the developers could introduce new vulnerabilities into the target device, or create features that have unintended side effects.
How does Facebook use the information people share to make money?
Facebook uses the information people share to make money by using the data to give to advertising companies, which in turn, pay Facebook for the data they receive so that they can target Facebook users with more individualized advertising. The advertising business can choose who they want ads to be shown to, customized to be relevant to the person's personal interests and likes. The more ads that users see on Facebook, the more money Facebook earns from the advertising company. Therefore, the exposure of the information people share to advertising companies, in order to place these advertisements, earn them money.
Describe the issues that Facebook should address.
Issues that Facebook should address include:
Privacy - The privacy of users' and their data should be kept private, and the issue needs to be addressed where other online companies target the user data, where the user clicks to see pages, and their online activity even though the user may not be online.
Reliability - The reliability of Facebook's security system should also be addressed. Facebook needs to address how users are aware or unaware of how their data is being shared through their friends' apps, or shared to advertising companies. Also, users would need to be reassured that their data isn't distributed to other third party companies.
* Customizability, highlighting parts required, bookmarking necessary 'pages'
* Choice of chapters (relevant material)
* Saves room in backpacks (less back strain), it's also lighter
* Digital textbooks can't be lost, and if the E-reader is lost it can simply be replaced, the material is also digitized and can't be lost
* Easy access and distribution, if everyone has their own E-reader, the material can simply be shared.
* Students are more receptive to digitized learning material
* Provide cross-cut paper shredders at each workstation or cash register area or uses a locked wastebasket and shredding company for the disposal of credit card slips, unwanted applications or documents, sensitive data or prescription forms.
* Use an alternate number instead of Social Security Numbers (SSN) for employee, client and customer ID numbers.
* Encrypt or password protect all sensitive data stored on computers and allow access only on a "need-to-know" basis.
* Notify consumers and employees in advance as to the purposes of the data collection, to whom it will be distributed and the subsequent use after the fulfillment of the original purpose.
* Keep sensitive information of consumers or employees on any item (timecards, badges, work schedules, licenses) out of view in public areas. That may include home addresses or phone numbers, SSN and driver's license numbers.