This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Kamis, 23 Februari 2017

Computer Crime and Abuse



New technologies, including computers, create new opportunities for committing crime by creating new valuable items to steal, new ways to steal them, and new ways to harm others.

Ø        Computer crime.
Computer crime is the manipulation of a computer or computer-generated data to dishonestly obtain something of value for personal gain, or to cause loss.  Computers or computer systems can be the object of the crime (destroying a company’s computer center or a company’s computer files), as well as the instrument of a crime (stealing computer lists by illegally gaining access to a computer system using a home computer).
What are some fraudulent activities that may lead to computer crime?  Some examples are:
1. Modification, copying or destruction of software or data,
2. Theft of time or money by altering computer records, or the lack thereof,
3.  The intent to illegally obtain information or tangible property through use of the computer,
4.  Theft, vandalism or destruction of computer hardware, and
 5. Obtaining unauthorized access to a computer through passwords or other login information by an unapproved user.


Ø         Computer abuse.
Computer abuse is the unauthorized use of, or access to, a computer, for purposes contrary to the wishes of the owner of the computer. Computer abusers receive intangible gains from their activities for reasons such as revenge, enjoyment or peer recognition. Abusers’ activities may not necessarily involve direct theft or damage, but damage companies’ losses in terms of time, reputation, etc. which are more difficult to identify and quantify.
One such activity is a computer virus, which is characterized by its ability to spread itself quickly from computer to computer and eventually destroy data or software, or disrupt system activities. A computer worm acts somewhat differently in that it replicates itself, filling available memory and/or storage to bring systems gradually to a halt. Employees sometimes inadvertently download unauthorized items or open e-mails of unknown senders that contain computer worms.




Source : http://www.kkb-cpa.com/blog/computer-crime-and-abuse

Health Risk


    We come back again guyyysss!!
If previously we've discussed about Internet challenges to privacy, now I would like to shares the interesting information. That is Health risk of computer usage. So, there are 3 occupational disease of using computer. Let’s discuss them.

*         Repetitive Stress Injury (RSI)

If you've ever developed a burning, aching pain in your elbow after playing too many rounds of tennis, or shooting pains and weakness in your hands after spending weeks glued to the computer while crashing on a project, you've probably experienced the early stages of repetitive stress injury (RSI).
Repetitive stress injuries (RSI) are injuries that happen when too much stress is placed on a part of the body, resulting in inflammation (pain and swelling), muscle strain, or tissue damage. This stress generally occurs from repeating the same movements over and over again.



*              Computer Vision Syndrome (CVS).

Computer vision syndrome (CVS) refers to any eyestrain condition related to display screen use in desktop computers, laptops, e-readers, smart phones, and handheld video games. CVS affects about 90 percent of people who spend three hours or more per day at a computer. Its symptoms, which are usually temporary, include headaches, blurred vision, and dry and irritated eyes.




*              Technostress

Technostress is stress induced by computer use. Its symptoms include aggravation, hostility toward humans, impatience, and fatigue. According to experts, humans working continuously with computers come to expect other humans and human institutions to behave like computers, providing instant responses, attentiveness, and an absence of emotion. Technostress is thought to be related to high levels of job turnover in the computer industry, high levels of early retirement from computer-intense occupations, and elevated levels of drug and alcohol abuse. The incidence of technostress is not known but is thought to be in the millions and growing in the United States. Computer-related jobs now top the list of stressful occupations based on health statistics in several industrialized countries.c


      So guys, I hope the information above can make us cautious and more aware of using of computer. Thank youJ


                                                                                               Resource: kidshealth.org/en/teens/rsi.html

laudon-management-information-systems-13th-global-edition-c2014-1.p


Selasa, 21 Februari 2017

Internet Challanges To Privacy



Internet technology has posed new challenges for the protection of individual privacy. Information sent over this vast network of networks may pass through many different computer systems before it reaches its final destination. Each of these systems is capable of monitoring, capturing, and storing communications that pass through it. Web sites track searches that have been conducted, the Web sites and Web pages visited, the online content a person has accessed, and what items that person has inspected or purchased over the Web.

Ø  Cookies.
Cookies are small text files deposited on a computer hard drive when a user visits Web sites. Cookies identify the visitor’s Web browser software and track visits to the Web site. When the visitor returns to a site that has stored a cookie, the Web site software will search the visitor’s computer, find the cookie, and know what that person has done in the past.

Ø  Web beacons ( Web bugs )
Web beacons are tiny software programs that keep a record of users’ online click stream and report this data back to whoever owns the tracking file invisibly embedded in e-mail messages and Web pages that are designed to monitor the behavior of the user visiting a Web site or sending e-mail.

Ø  Spyware.
Spyware can secretly install itself on an Internet user’s computer by piggybacking on larger applications. Once installed, the spyware calls out to Web sites to send banner ads and other unsolicited material to the user, and it can report the user’s movements on the Internet to other computers.

Ø  Google services and behavioral targeting.
About 75 percent of global Internet users use Google Search and other Google services, making Google the world’s largest collector of online user data. Whatever Google does with its data has an enormous impact on online privacy. Most experts believe that Google possesses the largest collection of personal information in the world. 

Behavioral targeting is a method used by online publishers and advertisers to increase the effectiveness of their campaigns. Google has been using behavioral targeting to help it display more relevant ads based on users’ search activities and to target individuals as they move from one site to another in order to show them display or banner ads. Google allows tracking software on its search pages, and using Double Click, it is able to track users across the Internet.

Resource: http://www.pearsonglobaleditions.com/Sitemap/mymislab/
Management Information Systems 13e Global edition 
Kenneth Laudon and Jane Laudon 


Improving Decision Making: Using Internet Newsgroups for Online Market Research

This project will help develop Internet skills in using newsgroup for marketing. It will also ask you to think about the ethical implications of using information in online discussion groups for business purposes.
You are producing hiking boots that you sell through a few stores at this time. You would like to use Internet discussion groups interested in hiking, climbing, and camping both to sell your boots and to make them well known. Visit groups.google.com, which stores discussion postings from many thousands of newsgroups. Through this site you can locate all relevant newsgroups and search them by keyword, author’s name, forum, date, and subject. Choose a message and examine it carefully, nothing all the information you can obtain, including information about the author.

Webelos Woods Weekend
October 21 - 23, 2011
At Seven Mountains Scout Camp

This camping weekend will give Webelos scouts and parents an opportunity to meet Troop 31 scouts and leaders.  We will be hosting Webelos from several different local packs.  We are hoping for a great turnout from Troop 31 to help give Webelos a great scouting experience.  Troop 31 will be camping on the Leopold site (see map). Scouts will be encouraged to sleep outside in tents. The cabin will be available for parents and in the event of inclement weather.  

Tentative schedule of events: 
Friday, Oct 21st
6:15 Meet at Omega Bank parking lot on Westerly Parkway. 
6:30 Depart for 7MSC.  Scouts should wear hiking shoes and clothing appropriate for an evening hike in the dark into camp.  Headlamps might be useful.  ALL scouts must have a Class A uniform for this trip, since we will be conducting opening and closing exercises with the entire council.  You will be given a chance  to take off your Class-A uniform before the Friday eve hike into camp.  A Class-B underneath your Class-A is recommended. 

Saturday, October 22nd
8:00 –10:00 am           – Scout arrival and registration
11:00 am                     – Flag Raising and welcome
11:30                           – 12:45 pm – Lunch in your campsites
1:00 – 4:00 pm            – The Challenge begins. Webelos should make up teams of   scouts.Teams can be consisting of up to 8-10 Webelos.
4:30 pm                       – Score sheets turned.
4:30 – 5:30 pm            – Freetime around camp
5:30 - 6:30 pm             – Patrol based cooking (webelos will participate in preparing a simple meal)
6:30 pm                       – Dinner & clean-up
8:00 pm                       – Campfire
9:00 pm                       – Camping at site 

Sunday, October 23rd
7:00 am                       – Breakfast in your campsite
8:00am                        – Chapel
8:30 am                       – Flag lowering and camp dismissal


Fee:  $25 per person.  This covers all fees to Juniata Valley Council, and Troop 31.
I'd like to have an accurate picture of who is going by Tuesday, October 18th (including names, permission slips and payment).  If you have any questions about the weekend, give me a call to discuss!

Yours in scouting,
Ed
ASM, Troop 31
 -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

PERMISSION SLIP

Troop 31 - State College, PA
Webelos Woods Weekend
Leopold Campsite, 7 Mts Scout Camp – Oct 21 – 23, 2011

My Son(s) ______________________________ has/have my permission for full participation (subject to limitations noted) in this Troop 31 outing.



Signature of parent/guardian _____________________________________________________________


Telephone Number (day) _____________ (Evening) _________________
Primary care physician _________________ Phone number(s) ___________________
(This information is needed in case we need to seek emergency care and are unable to reach a parent or guardian)

Medications (list any/all that the Scout is currently taking):


Limitations: 

Note ANY/ALL need for late arrivalearly departure, etc.:

Author:  Ed McCash


1.      How could you use these newsgroups to market your boots?
There are so many ways to promote your product, through any social media, advertisements, and in this case we are talking about newsgroup to promote our boots. In our perspective, we can share our product to the newsgroups that content some situations or activity which needs our product. In this case if we want to promote our boot, we have to search for any kinds of newsgroups that discuss about some activities related to the use of boot itself, for example hiking, climbing, camping, and many more. One of the content in newsgroups above stated that all scouts must have and use hiking shoes. According to this statement we can share our product efficiently, and scout members also can search for hiking shoes easily. By using newsgroups, all transactions and promotions can be done effectively and efficiently.

2.      What are ethical principles might be violating if you see these messages to sell your boots? Do you think there are ethical problems in using newsgroups this way? Explain your answer.
Indeed, there are some negative and positive side for using newsgroups as a place to promote your product (in this case: boot). According to our group there are some ethical principles that might be violating in selling boots.
The first is Descartes’ Rule of Change. It is stated that If an action cannot be taken repeatedly, it is not right to take it all. When they want to do the promotion by newsgroups, it can be a good choice at once. But according to our group, this kind of promotion cannot be taken repeatedly because it can lead us to what is called as "spamming". We can violating this principle when we are trying to do the promotion every day, and frequently. As a result, the member from discussion group will feel annoyed and no one will consider to buy certain product (in case: boot) 
The second principle that might be violated if you use message to sell boots is the Golden Rule. Golden Rule stated that do unto others as you would have them unto you. This principle can be violated when you give wrong information about your product. Every company tries to give their best in order to promote their product, and some of them might give wrong information about their product to attract their buyers. If you do wrong things unto the others, it means you would not have them unto you, and it is not based on Golden Rule principle.

3.      Next use Google or Yahoo search the hiking boots industry and locate sites that will help you develop other new ideas for contacting potential customers.
We already searched for sites that will help us in developing new ideas and contacting potential customers which is Maxwell Company. Maxwell is a company in China which focuses on producing any types of shoes including sport and hiking shoes. As you may see in www.maxwellinternational.com, we can get other information about the factors of its competition, competitive strengths, opportunities, and also about the prospects of producing footwear. According to Maxwell International Company, you have to have good track records with your costumers to get more potential costumer. As the time goes by they will trust you and as a result they will give you high profit. Despite of making good track records, you also need to give more innovation in design and material, because you are competing with other big international footwear company like Adidas, Nike, Converse, etc. Furthermore, you also need to do product diversification, in order to get attention from international customers. For long term, you should consider about marketing activities including the activities from your website, social media, virtual advertisements, e-business and also e-commerce to maintain the relationship between your company and costumer.

4.      Given what you have learned in this and previous chapters, prepare a plan to use newsgroups and other alternative methods to begin attracting visitors to your site.

In order to make newsgroup and other alternative methods to attract visitors to your site, first thing you have to do is make an attractive design, both your product and advertisements. Attractive means, the design is eye-catching, easy to understand, and up-to-date. And it must be different with the others, different in a good way. So buyer would consider to see your advertisement instead of looking for the other. Moreover, do not spread the advertisement in the same group frequently because people needs privacy especially when they are in discussion group. Next is choose the proper words to promote your product. Choose the simple words but arrange it in attractive ways so people can understand what your product is and get curious and interested to buy your product.   

Contra of allowing companies to amass personal data for behavioral targeting

Before I explain more detail about contra of allowing companies to amass personal data for behavior targeting, you must understanding what the behavioral targeting is.
Behavioral targeting refers to the different technologies and techniques used by online website publishers and advertisers which all them to increase the effectiveness of their campaigns. It is a method used online advertisers to collect information on Internet users in order to better target their advertising toward those users.

And…… it’s time to go to the point of this article!! So guys, there is a lot of the reason that’s prove the contra of allowing companies to amass personal data for behavioral targeting. Let’s check it out!
Ø Problems with cookies and usernames.
The most common way to track user online behavior is with cookies. The aim is to obtain enough data to record a user profile and determine their preferences, so that ads can be personally served, increasing a user’s purchasing desire.
The weakness of this technique is that there may be multiple users in one computer.  And also, browsers now have the option of deleting cookies and choosing to prevent some or all cookies from gathering data.

Ø Does not work for all products.
Usually behavioral targeting is more effective for products that don’t have mass appeal. If the products are for senior citizens, for example, it may be a tad more difficult to find viable viewers.
Ø Expensive.
Behavioral targeting is twenty to thirty percent more expensive than other traditional online advertising strategies.

Ø Uneducated clients.
One of the challenges of behavioral targeting is educating clients about it, and helping them understand what it is all about. Advertisers should also be told that while behavioral targeting is effective, it works best when complemented with other advertising techniques.

Ø Problems with location-based marketing.

 Location-based marketing is not that popular among the majority. Most of us would prefer privacy with our cell phones. Seeing an advertisement in our cell phone is not a marvelous event. The advertisement will need to add relevant information to the situation, otherwise users will get the feeling of being spammed. 



Resource: behavioraltargeting.biz/behavioral-targeting-pros-and-cons/ 

Top 5 E-business Companies in Indonesia


             E-Business is an activity of the transaction can be said of business done through electronic devices or the internet so that companies can directly interact with the customer or supplier or business associates. E-business can also mean the use of Information and Communication Technology to run at the same time managing the business so that it can make a profit. Information and Communication Technology in e-business is used to enhance the company's business covers all aspects of profit and nonprofit oriented firm.       
             E-business can be said as well as the ad so that consumers can buy the company's products.
So that e-business is very useful for e-comerce, because the function of e-business, to support the parts of the company as part prroduksi, finance, marketing etc. So companies will use Information and Communication Technology to run at the same time managing the business so that benefit. Below, has presented Top 5 E-business Companies in Indonesia:



       1. www.kaskus.us

Who does not know about kaskus? Every single person especially for teenagers in Indonesia surely know about this website. Kaskus is the largest virtual community forum sites with 3.4 million active users called “Kaskusers” 
Why Kaskus become the first successful e-business company in Indonesia? Kaskus (Kasak Kusuk) has page viewers for more than 15,000,000 and visited for more than 900 people each day! You can imagine how successful the CEO right?
Not only about the page viewers and visitors, Kaskus also provide the users with attractive, unique and up-to-date articles for all range of age. Moreover, Kaskus provides you with many virtual forum and discussion about anything in National range, so if you want to search for the discussion of certain film, or product, you can find it easily.
Kaskus offers FJB (Forum Jual Beli), with e-commerce system which is called as “e-pay” so all Kaskus users can do their transaction easily and practical. By this system Kaskus could gain much profit for the improvement of the company.
Beside of the facilities regarding the system itself, Kaskus also give the other feature like humorous and unique emoticons, so you can make your discussion or forum funnier and more attractive.


OLX is one of the most successful company in Indonesia trough e-business. Before becoming OLX, this website is called as “Toko Bagus” with the website www.tokobagus.com, sounds familiar right?  OLX gives the facility for seller to promote their product, and the facility for buyer to choose and buy certain product from the seller. And all for free! Instead of renting kiosk or spreading the advertisements to newspaper or radio, you can use this website. What the seller need to do is only make good documentations about their product and upload it to www.olx.co.id! So simple, right?
            The buyer could also get the benefit from this site. You can choose, buy, and pay certain product only by sitting in front of your laptop, or seeking from your own gadget. You can save your energy for going to the shopping center to do another activity.
            It is recommended for you to use this website for doing transaction. Why? Because with this e-business model it can save your energy, time, and also your money. So what are you waiting for? Just sign up in www.olx.co.id!




           3. www.airasia.com

Have some problem in reserving airplane ticket? No worries! Now you can do all transaction including reserving airplane ticket through www.airasia.com. Air Asia is one of the airplane company that has gain its success in developing e-business. Not only for reserving airplane ticket, www.airasia.com also provides several packages for hotel, and many more. Furthermore, you do not have to come to the travel agent to buy tickets and pay more than its price, by clicking and typing you can access your ticket and it is cheaper than you have to go to travel agent.
No disadvantage for accessing this website. You will find it more practical and cheaper than going to the travel agent. And from year to year Air Asia had got so much profit from applying e-business. That is why Air Asia becomes one of the best airplane company working in e-business.


Maybe it is sound unfamiliar, is it? Oto is a company that works in selling cars and motor bike. After applying e-business for their transactions, the selling number of Oto increase significantly until more than 1 Trillion rupiah in 2000! You can imagine how important e-business is. And it was increasing until reached around 1.5 T in 2001. From this company we can learn that e-business has lots of advantages for both seller and buyer. And now oto has new application called “Oto Care” for car insurance. In the technology era you can find many aspects in our life that already use e-business.

     




   
         5.  Garuda Indonesia


Garuda Indonesia is the biggest and best airlines in Indonesia that have implemented e-business in supply chain management. Garuda Indonesia has succeeded in conducting e-auction for the procurement of jet fuel with transaction value reached US $ 54 million.





Resource: http://fatlyrisky.blogspot.co.id/