tag:blogger.com,1999:blog-76165724977316522772024-03-14T00:52:47.265-07:00Senior Seminar in Computer Information Systems.This blog presents the papers with the ACM digital Library Research!
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-7616572497731652277.post-63445158916322810122011-11-26T01:16:00.001-08:002013-06-11T13:03:05.780-07:00RFID and the end of cash?<div dir="ltr" style="text-align: left;" trbidi="on">
<br /><div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">
November 16, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">RFID
and the end of cash?</span></b><br />
<b><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;"><br /></span></b></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> <span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;"> Cash transaction
cannot be tracked but, the more detailed recording of the RFID transfers could
help Government track the flow of money as well as tax them (</span></span>Angell,
Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). Auto
identification technology feature of RFID was first used by the Royal Air Force
during the times of World War II, which could differentiate friendly aircraft
with the enemy (</span></span>Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). And, the time since then, the
advancement and research in the RFID technology have eased people’s life as
well as helped business succeed in many perspectives. But, at the same time, it
created a question for us to answer about its future use, and the concerns
about the privacy of the individuals. </span></span></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> Of
all of the privacy issues about its future use, RF-emitting tags that are small
enough to fit into the bank notes, so that, the Government would be able to
track the cash transactions, seems to be on the top of the concern for most of
the individuals. Most of the individuals are concerned about their privacy
about being anonymous, as well as, not being able to enjoy the properties of
cash as fungibility and stored value (</span></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;">Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). The authors
of the article seem to be outraged by the Government’s involvement in using
technology to control the citizens of its Nation by introducing the RFID technology
to end the cash. </span></span></span></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> The
positive use of the RFID technology seems to be the answer by the Government
for the individuals who are against it. This technology could be used to easily
find the misplaced keys, phones, spectacles and any belongings of the
individuals (</span></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;">Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). But, it could be debated by the fact
that private information about the individuals, and their belongings could be
easily tracked creating the database of the individual, and their behaviors,
which is a serious privacy concern (</span></span>Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). Authors of
this article distinctly categorized the supporters of the RFID technology as
the U.S. Department of Defense, Wal-Mart, and the mobile technology sectors,
and seem to be outraged by their negligence towards the privacy of the individuals
(</span></span>Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">).</span></span></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> Even
though, there are many advantages of using RFID technology by the Government
officials, for instance to track the terrorist in the airports by reading the
tagged passports in the proper range, the authors, smartly questioned about the
use the same technology by the wrong person to gain private information, and
using it to create chaos, or, benefit from it (</span></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;">Angell,
Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">).
We would soon be living in the world of tags and, the rate of identity theft
could even increase which would be really hard to control, if the technology
would be implied in our society (</span></span>Angell, Ian<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black;">). </span></span></span></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> The
RFID technology would definitely end the cash we know of, in today’s world.
With many disadvantages over advantages, in concern with the individual’s
privacy, the use of RFID technology would enable the Government and the big
corporations, to regulate taxation and control over the citizens. Also, this
can definitely create many identity theft issues, and would directly affect the
individual’s right to privacy.</span></span><span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> </span></span><span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> </span></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: none repeat scroll 0% 0% white; color: black; font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"><o:p> </o:p></span></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"><o:p> </o:p></span><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 200%;"> </span></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Works
Cited: </span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span style="font-family: "Times New Roman","serif"; font-size: 12pt; line-height: 115%;">Angell,
Ian, and Jan Kietzmann. "RFID and the End of Cash?" <i>ACM Digital
Library</i>. ACM New York, NY, USA, Dec. 2006. Web. 16 Nov. 2011. <http://dl.acm.org/citation.cfm?id=1183236.1183237>.</span></div>
<br /></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-49011577447736001222011-11-26T01:07:00.001-08:002013-06-11T13:03:40.948-07:00Promoting Personal Responsibility for Internet Safety<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
November 19, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Promoting
Personal Responsibility for Internet Safety</span></b></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>As we are using internet and technology more than before
to communicate and perform our daily jobs, it is the right time to spread the
awareness to every individual, to teach them to protect themselves, against the
threats that come along with the use of this technology. The author believes
that if the user himself is aware, and takes responsibility for the internet
safety, then, most of the problems of IT security would be miraculously solved.
</span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>To promote online safety, many websites (Staysafeonline,
iSAFE, Cybersmart, i-Safety etc.) provides strategies that include the fear
factor for the threat appraisal, and building confidence for the coping
appraisal, for online safety (LaRose, Robert). Moderate amount of <i style="mso-bidi-font-style: normal;">fear</i> would motivate individuals that
results in online safety, whereas, low amounts of fear diminish safety (LaRose,
Robert). <i style="mso-bidi-font-style: normal;">Self-efficacy</i> is the key for
any individual to be safe online because it has direct impact on safe behavior.
Building <i style="mso-bidi-font-style: normal;">response efficacy</i> would help
users to be safe online which it is very important. </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The natural tendency of a human being, to measure the
rewards and the costs that are involved in practicing safe and unsafe behavior,
would also impact the user’s actual safety practices, and its effectiveness (LaRose,
Robert). <span style="mso-spacerun: yes;"> </span>We need to encourage user of
the system to promote safe behavior by highlighting the benefits, in long run. <i style="mso-bidi-font-style: normal;">Involvemen</i>t is very critical action that
users should be motivated to be practiced, so that, they see safe behaviors
resulting the benefits, rather than a hassle. We need to inbuilt a <i style="mso-bidi-font-style: normal;">moral responsibility</i> for every
individual towards self-regulation to take responsibility. The authors
conducted a survey of many individuals who believed that online safety is their
own personal responsibility as well as those individuals who believed just the
opposite (LaRose, Robert). The result of the survey is very obvious that those
who took responsibility were more likely to protect themselves from the threats,
by their greater involvement in the activities as updating virus protection,
scanning with a hijack eraser, using anti-spyware, updating operating system
patches, deleting temporary files as well as cookies, using spam filters as
well as pop up blocker and most importantly - using a firewall (LaRose, Robert).<span style="mso-spacerun: yes;"> </span>Some individuals may be sound professional in
the field of Computer Science, and the individual may be so confident that even
if the system gets compromised, he/she could get out of it, and, would not take
the responsibility to take actions of regular maintenance (LaRose, Robert).
This is a serious problem, because it would be hard to motivate those
individuals towards promoting personal responsibility for internet safety. </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Therefore, to encourage individual users for online
safety, the most important factors that contribute to motivate them, seems to
be encouraging them for personal responsibility, self-efficacy, response
efficacy, and involvement. I completely agree with the author’s points and
their studies on the computer user’s behavior on online safety. I personally
believe that if every individual listens to their <i style="mso-bidi-font-style: normal;">intuition</i> and takes responsibility for the safe online practices,
then most of the online privacy issues would be solved.</span></div>
<div class="MsoNormal" style="line-height: 200%;">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited: </span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">LaRose,
Robert, Nora J. Rifon, and Richard Enbody. "Promoting Personal
Responsibility for Internet Safety." <i>ACM Digital Library</i>. ACM New
York, NY, USA, Mar. 2008. Web. 17 Nov. 2011.
<http://dl.acm.org/citation.cfm?id=1325555.1325569>.</span></div>
<br /></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-85124817901837182052011-11-26T00:48:00.001-08:002013-06-11T13:04:11.194-07:00What matters when introducing new information technology?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
November 5, 2011<br /></span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">What
matters when introducing new information technology?<span style="mso-tab-count: 1;"> </span></span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Technology is changing every day and implementation of
new technology is very important as well as risky. Without the proper
management, in the process of introducing new information system, backed up by
the right workforce to implement it, the introduction of new information
technology would most likely face problems. Therefore, to successfully
introduce a new information technology, the support of top level management to
avoid the common problems, such as commitment, knowledge, communication,
planning and infrastructure would be very helpful (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown, Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).<span style="mso-spacerun: yes;"> </span></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>We need to have our management team to be able to
properly implement the information system that includes initiation, adoption,
adaption, acceptance,</span> <span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">routinization, and infusion (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown, Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). The article
neatly concludes the idea that the management implementing the right issues at
the right time would help the implementation process that would give positive
outcome (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown,
Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
The research conducted in the article suggests that the information system had
problems in commitment, knowledge (technology expertise limited), communication
(lacked communication with customers and across the group members), planning
(made up their own criteria and format), and infrastructure (incompatibility
between new system an existing system) indicating the importance of commitment
that increases over time (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown, Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).</span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The organization can be successful by investing in the
employee education, making communication environment for the employees,
evaluating the infrastructure, renewing the commitment in words as well as
deeds, and, preparing and following the planning (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown, Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). All of these
factors for an organization should be balanced and harmonized just as the
musician in an orchestra would do for a pleasant music (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Brown, Susan A</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). A project
could be successful, but, it may have been delayed in its delivery that may
affect the productivity of the project, especially, in today’s world, when
technology is changing so rapidly. So, we need to deliver our information
system within the deadline as well as at the allocated budget, for the project
to be really called successful. </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Overall, I completely agree with the authors and their
suggestions for successfully introducing the new information technology. Top
level management by implementing knowledge, communication, infrastructure,
commitment and planning in the process of introducing the new information
technology would make a more likely probability for the project to be
successful.</span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited: </span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN;">Brown, Susan A., Bryan A. Reinicke, and
Norman L. Chervany. "What Matters When Introducing New Information
Technology | September 2007." Communications of the ACM. ACM New York, NY,
USA, Sept. 2007. Web. 07 Nov. 2011.
<http://cacm.acm.org/magazines/2007/9/5567-what-matters-when-introducing-new-information-technology/fulltext>.</span></div>
<div class="MsoNormal" style="tab-stops: 420.75pt;">
<br /></div>
<br /></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-89404527919161296392011-11-26T00:41:00.001-08:002013-06-11T13:04:29.452-07:00What's Wrong with Online Privacy Policies?<div dir="ltr" style="text-align: left;" trbidi="on">
<br /><div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
November 12, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">What's
Wrong with Online Privacy Policies?</span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Online privacy policies are used to inform the users of
the organization, the policies that the organization has towards the users on
how the information of the users is accessed, and to what level. The user has
the rights to know about it as well as the organization are more likely to put
these information, so that, they inform users of what they can do, and, cannot.
Unfortunately, the <i style="mso-bidi-font-style: normal;">trend</i> of
displaying these policies by the organization has been criticized of being too
long, vague, unclear, miss representing, and most importantly, they tend to
address the protection of the company against privacy lawsuits that are hardly
understood by the general users (<span class="apple-style-span"><span style="background: white; color: black;">Pollach, Irene</span></span>). </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Customer should always be at the core of any business.
Since, businesses are going more online than ever before, the time has come
that the business should practice good online policies to inform the users of
how their information is being used. This would earn the user’s trust and,
encourage the users to participate in online transaction, which could help any
business to gain the customers in this competitive market (<span class="apple-style-span"><span style="background: white; color: black;">Pollach,
Irene</span></span>). They should be clear on the factors as how they are
handling customer’s data, and if they would be providing information to the <i style="mso-bidi-font-style: normal;">third parties</i>. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The online privacy policy should be written in simple
language that could be read even by the people who are not well educated
because, study has found that the internet users are not reading online privacy
policies since they are more of a <i style="mso-bidi-font-style: normal;">legalistic</i>
and hard to read (<span class="apple-style-span"><span style="background: white; color: black;">Pollach, Irene</span></span>). The author of the article, What's
Wrong with Online Privacy Policies?, conducted studies with many companies
about how the policies would reflect about data handling, and how they describe
their data handling practices concerning to data collection, third-party data
collection, data storage, data sharing, and market communication (<span class="apple-style-span"><span style="background: white; color: black;">Pollach,
Irene</span></span>). <span style="mso-spacerun: yes;"> </span>The studies showed
that 39.4% of the questions couldn’t be answered with the policies of many
companies, as well as, the data storage that stood out are of insufficient
disclosure that needs to be addressed to gain the user trust (<span class="apple-style-span"><span style="background: white; color: black;">Pollach,
Irene</span></span>). </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The language used in writing policies are basically based
on <i style="mso-bidi-font-style: normal;">linguistics</i> that may be
interpreted by a normal user in a different manner, away from reality, or, they
would not be able to understand it properly (<span class="apple-style-span"><span style="background: white; color: black;">Pollach, Irene</span></span>). Therefore,
they need to be clear enough for the users to read and understand the policy,
by the proper use of lexical choice, syntactical transformation, negation, and
modality in language that is used in online privacy policies (<span class="apple-style-span"><span style="background: white; color: black;">Pollach,
Irene</span></span>). Also, presentation<span style="mso-spacerun: yes;">
</span>of different types of data and data handling methods in user friendly
cells to enable users to decide which parts of the policy they would like to
get information on, would definitely help better user experience, leading user
satisfaction and company goodwill (<span class="apple-style-span"><span style="background: white; color: black;">Pollach, Irene</span></span>). </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The article by <span class="apple-style-span"><span style="background: white; color: black;">Irene Pollach, neatly presents the <i style="mso-bidi-font-style: normal;">flaws</i> of the general online privacy
policies written by most of the companies. The author also proposed the <i style="mso-bidi-font-style: normal;">solution</i> and <i style="mso-bidi-font-style: normal;">recommendation</i> about the best practices, that would help the
customers gain confidence towards online transaction, and, the company creating
a goodwill and <i style="mso-bidi-font-style: normal;">long term</i> positive
results. I completely agree with the authors suggestions and his ideas that
the <i style="mso-bidi-font-style: normal;">transparent online policies</i> would
only help the company to build positive relationships with the customers. </span></span></span></div>
<div class="MsoNormal" style="line-height: 200%;">
<br /></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited: </span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span class="apple-style-span"><span style="background: white; color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Pollach,
Irene. "What's Wrong with Online Privacy Policies?"</span></span><span class="apple-converted-space"><span style="background: white; color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"> </span></span><i><span style="background: white; color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">ACM Digital Library</span></i><span class="apple-style-span"><span style="background: white; color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">. ACM New
York, NY, USA, Sept. 2007. Web. 12 Nov. 2011.
<http://dl.acm.org/citation.cfm?id=1284621.1284627>.</span></span></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<br /></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal" style="tab-stops: 420.75pt;">
<br /></div>
<br /></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-45776207734175094692011-11-26T00:29:00.001-08:002013-06-11T13:28:41.709-07:00A Risk Profile of Offshore-Outsourced Development Projects<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">
November 5, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">A
Risk Profile of Offshore-Outsourced Development Projects</span></b></div>
<div class="MsoNormal" style="line-height: 200%;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">In the today's
world of Economic Globalization, offshore-outsourced development projects are
increasing day by day, and, the trend in its increase indicates that in future,
more of the business would be relying on it. The problem lies in this process,
for any business, to be able to efficiently achieve the objectives they are
looking for, in the products and services, they are outsourcing. ACM performed
a study of the risk factors of offshore-outsourced development which presented
a <i style="mso-bidi-font-style: normal;">serious threat</i> to the successful
completion of the project (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). Previously, studies had been
conducted, but, it was based on in-house and domestically outsourced
environments (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou,
Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).</span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The study started by selecting experienced senior project
managers and directors to complete a form summarizing their experience, and
finally, selecting 15 out of 57, well qualified individuals to participate in
the study, such as, <i style="mso-bidi-font-style: normal;">Delphi Survey method</i>
(</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou,
Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). The result of the study basically suggested that
most likely, “offshore initiatives experience the same fundamental issues that
affect non-offshore ones.” (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). But, the <i style="mso-bidi-font-style: normal;">in depth insights</i> from the panelists’ suggested that they most
likely poses sever threats in multinational and distance based working teams (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
A recent ACM report suggests that outsourcing "magnifies existing risks
and creates new threats” (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). Therefore, as an offshore
client, we need to be very careful in providing the resources to communicate with
the outsourcing companies, so that; they would be efficient in delivering our
deliverables. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The panel came up with the 10 most important risk factors
in offshore project development which concentrate on three major areas of
concern, that includes - <i style="mso-bidi-font-style: normal;">miscommunication
in client-vendor communications</i>, <i style="mso-bidi-font-style: normal;">language
and other environmental factors that miscommunicate the original set of
requirements</i>, and, the most common – <i style="mso-bidi-font-style: normal;">language
and cultural barriers in the project communications</i> (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
The other risks that need to be solved are poor change controls and the lack of
informal interactions between the developers and the users (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
Lack of top management commitment, lack of offshore project management know-how
by client, failure to manage end user expectations, lack of know-how by
offshore team, as well as, failure to consider all the costs involved, are the
major issues that the study came up with, in accordance to mitigate the risk
factors in offshore projects (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Iacovou, Charalambos L</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>In short, offshore projects face higher risks that involve
the traditional project risks as well as threats that are common to offshore
environment. Hence, they need to overcome these <i style="mso-bidi-font-style: normal;">risks and threats</i> so that, the project would incur less level of
failure. I agree on all of the risk factors and, their rating given by the
panelists which is very helpful for us, if we decide to offshore our projects.
The risk factor 17, “Constraints due to time zone differences”, and its rating
at 5.8 seem to be over stated, in my opinion. This should not have much impact
on the communication between the offshore team and the client, because as far
as I know, offshore team manages their working schedules according to the time
zones of the client location. But, overall, this study really gives us insights
of what needs to be prioritized by the clients, before or during their
outsourcing of their offshore projects, so that, they would be able to select <i style="mso-bidi-font-style: normal;">the risk factors</i> that are more important
to them and the outsourcing companies abroad. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited: </span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN;">Iacovou, Charalambos L., and Robbie Nakatsu.
"A Risk Profile of Offshore-outsourced Development Projects | June
2008." <i>Communications of the ACM</i>. ACM New York, NY, USA, June 2008.
Web. 05 Nov. 2011. <http://cacm.acm.org/magazines/2008/6/5389-a-risk-profile-of-offshore-outsourced-development-projects/fulltext>.</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal" style="tab-stops: 420.75pt;">
<br /></div>
<br /></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-46455481567636528332011-11-22T11:59:00.001-08:002013-06-11T13:06:01.834-07:00Reducing Internet Auction Fraud<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><br />
November 1, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Reducing
Internet Auction Fraud</span></b></div>
<div class="MsoNormal" style="line-height: 200%;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">When we are
connected to internet, we are networked to the virtual world of so many people
and chances are that, we may be vulnerable to internet fraud. The Financial
Times in 2003 noted that online fraud was 20 times higher online than offline (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). The
complaints of online fraud registered at the IC3 Web site was 20,000 in 2000,
in comparison to 200,000 in 2007, which is a huge increase in its rate (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). We need to be
prepared to face even more challenges in the near future as every business and
everything we do, are going in to cloud with the boom of cloud computing. </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>The article clearly makes a point that if we provide
automatic insurance for the buyers and the seller, it generates more bidding
activity as the two parties are more comfortable, involving in the bidding
which might produce more instances of auction fraud (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). Even though,
seller can be the victim of fraud, the more likely party that suffers the most
out of it is the buyer because the experience of the system as well as the
process of auction is more likely to be greater with the seller than the buyer
who visit the site just to buy the particular item that they are interested in
(</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).</span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>To reduce the auction fraud, the auction houses should
increase the information that is shared by the sellers as well as the buyers (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). The total
number of transaction and the positive responses out of the total is definitely
one of the information of the seller that would be beneficial to reduce the
auction fraud. Also, a separate statistics for selling and buying, for the
member of the auction houses would be beneficial, because it would help the
buyer not to misinterpret the positive score that may have been tricked on to
attract buyers (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish,
Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
The auction houses should send a secret code in the physical address of the
seller to validate the seller, so that, they would be able to discourage the
fraud sellers (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish,
Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">).
The escrow services officially certified by the auction houses would definitely
help reduce the fraud. Another great idea would be to charge the seller with
the amount of money that he is selling online, because the buyer is already
charged with the amount before they get the product (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). Insurance
companies should be certified by the auction houses, and a mandatory field for
the sellers to do the transaction, would definitely help reduce the increasing
proportions of the auction fraud (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). </span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>Of all the points above, the most important one to reduce
the auction fraud is the precaution that the buyer should be motivated to take
doing the transaction. As a buyer, we can check with Better Business Bureau for
the reputation of the company (</span><span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%; mso-ansi-language: EN;">Gavish, Bezalel</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">). Try to get the products by going to
an “eBay Xchange Point,” if it’s available. Always pay with your credit card
not western union or any other forms of payment. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>I’m personally very much convinced with the article,
“Reducing Internet Auction Fraud”. More information on the seller and buyer,
separate statistics for selling and buying, charging the seller an amount equal
to the sale, sensible insurance policy and most importantly the awareness to
the buyers to protect themselves would definitely help reduce the internet
auction fraud. But, I disagree with the authors point to institute regulatory
control over the auction. The very beauty of the freedom that the buyer, seller
and the auction houses have to perform the transaction without hassle would be
endangered. I think people should be morally encouraged to do the right thing
than to control them. <span style="mso-tab-count: 1;"> <br /></span></span></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited: </span></b></div>
<span lang="EN" style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%; mso-ansi-language: EN; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;">Gavish,
Bezalel, and Christopher L. Tucci. "Reducing Internet Auction Fraud | May
2008." <i>Communications of the ACM</i>. Communications of the ACM. Web.
02 Nov. 2011.
<http://cacm.acm.org/magazines/2008/5/5409-reducing-internet-auction-fraud/fulltext>.</span></div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0tag:blogger.com,1999:blog-7616572497731652277.post-2145930568496834682011-11-20T22:24:00.001-08:002013-06-11T13:07:34.915-07:00The ACM Code of Ethics<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG/>
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:View>Normal</w:View>
<w:Zoom>0</w:Zoom>
<w:TrackMoves/>
<w:TrackFormatting/>
<w:PunctuationKerning/>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:DoNotPromoteQF/>
<w:LidThemeOther>EN-US</w:LidThemeOther>
<w:LidThemeAsian>X-NONE</w:LidThemeAsian>
<w:LidThemeComplexScript>X-NONE</w:LidThemeComplexScript>
<w:Compatibility>
<w:BreakWrappedTables/>
<w:SnapToGridInCell/>
<w:WrapTextWithPunct/>
<w:UseAsianBreakRules/>
<w:DontGrowAutofit/>
<w:SplitPgBreakAndParaMark/>
<w:EnableOpenTypeKerning/>
<w:DontFlipMirrorIndents/>
<w:OverrideTableStyleHps/>
</w:Compatibility>
<m:mathPr>
<m:mathFont m:val="Cambria Math"/>
<m:brkBin m:val="before"/>
<m:brkBinSub m:val="--"/>
<m:smallFrac m:val="off"/>
<m:dispDef/>
<m:lMargin m:val="0"/>
<m:rMargin m:val="0"/>
<m:defJc m:val="centerGroup"/>
<m:wrapIndent m:val="1440"/>
<m:intLim m:val="subSup"/>
<m:naryLim m:val="undOvr"/>
</m:mathPr></w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267">
<w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/>
<w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/>
<w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/>
<w:LsdException Locked="false" Priority="39" Name="toc 1"/>
<w:LsdException Locked="false" Priority="39" Name="toc 2"/>
<w:LsdException Locked="false" Priority="39" Name="toc 3"/>
<w:LsdException Locked="false" Priority="39" Name="toc 4"/>
<w:LsdException Locked="false" Priority="39" Name="toc 5"/>
<w:LsdException Locked="false" Priority="39" Name="toc 6"/>
<w:LsdException Locked="false" Priority="39" Name="toc 7"/>
<w:LsdException Locked="false" Priority="39" Name="toc 8"/>
<w:LsdException Locked="false" Priority="39" Name="toc 9"/>
<w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/>
<w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/>
<w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/>
<w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/>
<w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/>
<w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/>
<w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/>
<w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/>
<w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/>
<w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/>
<w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/>
<w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/>
<w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/>
<w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/>
<w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/>
<w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/>
<w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/>
<w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/>
<w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/>
<w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/>
<w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/>
<w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/>
<w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/>
<w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/>
<w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/>
<w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/>
<w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/>
<w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/>
<w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/>
<w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/>
<w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/>
<w:LsdException Locked="false" Priority="37" Name="Bibliography"/>
<w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/>
</w:LatentStyles>
</xml><![endif]--><!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
</style>
<![endif]-->
<br />
<div class="MsoNormal">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"><br />
October 28, 2011</span></div>
<div align="center" class="MsoNormal" style="text-align: center;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">The
ACM Code of Ethics</span></b></div>
<div class="MsoNormal" style="line-height: 200%;">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span></span></b><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">We as the member
of ACM as well as a computer professional; we <span class="apple-style-span"><span style="background: white; color: black;">need to make sure our actions in our professional
as well as personal life, follows the ACM code of ethics. In long run, if we
follow the ACM code of ethics, we as an individual, as well as our company
would have higher probability of reaching the goals and objectives. The codes
would integrate all computer professionals giving them the correct path to
practice what is right and ethical. We need to abide by the ACM code of ethics
by following all sections as general moral imperatives, more specific
professional responsibilities, organizational leadership imperatives and
compliance with the code (</span></span><span style="color: black;">Code of
Ethics - Association for Computing Machinery<span class="apple-style-span"><span style="background: white;">). </span></span></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%;">
<span class="apple-style-span"><span style="background: white; color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>In
general moral imperatives for ACM code of ethics, we have to contribute to
society and human well-being by building applications that would be helpful. We
should avoid the use of computer technology to harm other users, employees, employers
or the general public. Honesty being the essential component of trust, an
organization cannot function effectively without trust (</span></span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">Anderson,
Ronald E, Page 101). An individual must be honest in disclosing both the
advantages as well as the problems that is present in the system. We need to
incorporate within our work environment, the values of equality, tolerance,
respect and the principles of equal justice (<span style="color: black;">Code of
Ethics - Association for Computing Machinery</span>). We should also honor
property rights including copyrights and patent. We should always give proper
credit to intellectual property as well as respect the privacy of others. All
the information that we have in our database is personal property and we should
not misuse it in any manner. Therefore, we need to honor the confidentiality of
the information we have access to. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQvRXS4jvAXZ7CgMVJNH0JOHjxR0Sm4PF-cWY02u46_njDrqPpDvCtytJZwMXaSXaJEkC_UUXhFBHS9rMWGFiohgaIqfdCQhuUfXo441jE9JBwehZTQ4sxcqu0OsRAQMdI0A9U6DPNrDU/s1600/r14_17252033.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>More specific professional responsibilities includes
strive to achieve the highest quality, effectiveness and dignity in both the
process and products of professional work.<span class="apple-style-span"><span style="background: white; color: black;"> We as a computer professional always need
to acquire and maintain professional competence by constantly learning the new
technologies to upgrade ourselves. We also need to obey existing laws or be
responsible for not obeying it. It is always ethical to accept the professional
review of our co-workers as well as provide the critical review for the works
of others (</span></span><span style="color: black;">Code of Ethics - Association
for Computing Machinery<span class="apple-style-span"><span style="background: white;">).<span style="mso-spacerun: yes;"> </span>We have a special
responsibility of providing credible evaluations that may have conflicts as
well as we should honor contracts, agreements, and assigned responsibilities (</span></span>Code
of Ethics - Association for Computing Machinery<span class="apple-style-span"><span style="background: white;">). We should disclose the facts about our progress. We
also have a responsibility of informing the public about the system we created,
its limitations and its consequences. Trespassing and unauthorized use of computers
is unethical, and we should completely avoid it unless we are authorized to do
so (</span></span>Code of Ethics - Association for Computing Machinery<span class="apple-style-span"><span style="background: white;">).</span></span></span></span></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal" style="line-height: 200%; text-indent: .5in;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;">Organizational
leadership imperatives help the organization and the leaders of the
organization to lead the business ethically for its long term objectives.
Hence, the compliance with the code would secure the membership in ACM for any
computer professionals else, otherwise, would be terminated (<span style="color: black;">Code of Ethics - Association for Computing Machinery</span>).</span></div>
<div class="MsoNormal" style="line-height: 200%;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 200%;"><span style="mso-tab-count: 1;"> </span>As a member of ACM, I would seriously abide by the codes
of ethics given by ACM. I personally think that we as a computer professional
should use our knowledge to make people’s life even easier and not harm others
or disguise in any means. Hence, we need to follow ACM code of ethics in our
organizations. </span></div>
<div class="MsoNormal" style="line-height: 200%;">
<br /></div>
<div class="MsoNormal">
<b style="mso-bidi-font-weight: normal;"><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Works
Cited:</span></b></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">Anderson,
Ronald E., Deborah G. Johnson, Donald Gotterbarn, and Judith Perrolle.
"Using the <span style="mso-spacerun: yes;"> </span>New ACM Code of
Ethics in Decision Making." ACM Digital Library. ACM New York, NY, USA,
Feb. 1993. Web. 29 Oct. 2011.
<http://dl.acm.org/citation.cfm?id=151220.151231>.<span style="mso-tab-count: 1;"> </span></span></div>
<div class="MsoNormal" style="margin-left: .5in; tab-stops: 420.75pt; text-indent: -.5in;">
<span style="color: black; font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;">"Code of Ethics - Association for Computing Machinery." <i>Welcome
— Association for Computing Machinery</i>. ACM, 16 Oct. 1992. Web. 29 Oct.
2011. <http://www.acm.org/about/code-of-ethics>.</span><span style="font-family: "Times New Roman","serif"; font-size: 12.0pt; line-height: 115%;"></span></div>
</div>
Prajwal Shresthahttp://www.blogger.com/profile/11939700602815080817noreply@blogger.com0