All Articles

Should the United States increase the number of H-1B visas and green cards so international skilled workers can become permanent residents?

The basic point underlying the issues is that U.S. has an immense shortage of highly skilled labor ever year and the current percentage of fresh graduates from the STEM field is far less when compared to this huge requirement. Immigrants has always been a boost to U.S. economy. Providing more opportunities for highly skilled workforce…

All Articles

Where should cyberlaw enforcement be centered?

I appreciate the study conducted by UCSD that it provides some striking insights into operation of scam engines and their origin stations. Based on this research, policies should be devised to regulate ISPs not to provide services for hosting such websites. Enforcing this policy cannot be done from a centralized location. Why don’t we share…

All Articles

How Pervasive is Phishing?

Antiphishing.org links us to various useful means to counter phishing. skimming through the website, here are two things that interested me – 1. The phishing and crime-ware map, which shows world-wide distribution. 2. GAIN technology from InternetPerils which claims highly effective ways to monitor internet traffic using efficient data pattern analysis. Good tool that can…

All Articles

Should the US recognize criminal law sanctions from other countries when those countries accuse US citizens of violating the other country’s laws?

Cyber-Crime and its big brother – “Cyber-warfare”, have so conquered the ever expanding and versatile cyberspace that we need to establish new international polices and regulations which will enable easy coordinated crime-fighting between nations. Its not about questioning who is accusing who, rather the grave situation here to find am amicable solution for international peace…

All Articles

USA Patriot Act and Data mining

I think its the USA PATRIOT Act that gives the right to do this kind of data mining. This actually amended a handful of other Acts such as – Wiretap Statute (Title III): Electronic Communications Privacy Act Computer Fraud and Abuse Act Foreign Intelligence Surveillance Act Family Education Rights and Privacy Act Pen Register and…

All Articles

Will intelligence add-ons to the internet make it easier for hackers to penetrate the internet for criminal purposes?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Using Technology to combat terrorrism?

Here’s a special report that analyzes how the Internet can facilitate terrorist operations – http://www.usip.org/pubs/specialreports/sr116.html . It reveals the ways in which terrorists exploit Internet resources for various activities. It’s shocking to read how they have been so Internet savvy and have been utilizing it for psychological warfare to recruitment, networking to fundraising and data-mining…

All Articles

Can federal legislation prohibit certain types of computer usage in schools without violating students’ free speech rights?

Children’s legitimate free speech as applicable to them should not be barred in any case. I have little support for the free speech advocates out there in the current issues that we face in the case of minors. If MySpace leads to minors having being lead to unrestricted content and practices, then there should strictly…

All Articles

Can filtering protect children from harmful material in chatrooms, blogs, and social networks?

I don’t think there is any explicit filtering technology available that can completely avoid harmful material from chartroom, social networking and blogs. There should be manual and AI based monitoring available that checks for content periodically and raise alarms when it detect something bad going on. All such sites should be personalized services so that…

All Articles

Should legislation focus just on spyware, on undesireable practices (with spyware being just one example), or should legislation focus on protecting privacy and security of personal information?

Spyware is an explicit program that is written with the intention of collecting and using personal info, illegally. Of course its one other way to invade privacy. From the text, literature and real world experience, we know how vast is the world of privacy invasion and techniques that leads to it. Unless we have clear…

All Articles

Is there a more effective strategy for helping developing countries increase the computer and information literacy of their children?

Intel’s Maloney’s words – “It’s about the Web more than anything. I have young kids …….. doesn’t have access to the Web is overwhelming” – is very striking. OLPC efforts might be an answer to this concern. Strategy and plan alone doesn’t work when we are talking about reforming developing nations, cost effective infrastructure is…

All Articles

What protections should the public have regarding access to broadband networks for reception and/or transmission?

700 Mhz band is being developed and utilized with the intention of allowing entrepreneurs with less capital to establish broadband services, since it offers cheap means to setup service. This is the reason for the major players influencing Congress to gain an upper hand so that they kill competition and innovation. The term “public” means…

All Articles

Should carriers have the freedom through contracts and licenses to shape how their networks will be used?

Again this is an instance of protecting consumer rights and freedom in utilizing the digital medium. The carriers have a very important role in maintaining a healthy pipe that is effectively utilized. There should be efforts to setup regulation and standards to avoid piracy and unauthorized usage of network traffic. At the same time the…

All Articles

Should broadband distributors be regulated as common carriers by the FCC?

From the literature and court cases, FCC is less obliged to regulate broadband distributors as common carriers, as “Computer network Information” services are not subject to common carrier telecommunication service regulation under Title II of the federal Communications Act. (NCTA v. Brand X Internet Services et al., U.S. Supreme Court Nos. 04-277 and 04-281, June…

All Articles

Modifying World Trade Organization’s TRIPS agreement?

Here is another analysis article on a widely asked question – “Should treaties like the World Trade Organization’s TRIPS agreement be modified so developing countries can ignore software patents without facing WTO retaliatory measures?” Read along.. In my opinion, IPR should be preserved anywhere in the world. Making strict TRIP regulations has its major advantage…

All Articles

Is there a need to legitimate digital rights management mechanisms for protecting intellectual property?

This article is a good resource for those who want to know more about the most raised question – Is there a need to legitimate digital rights management mechanisms for protecting intellectual property? Read along .. As the article suggests, DRM is being inherently misused to invade user privacy. This “improper advantage” should not be allowed. DMCA…

All Articles

Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified?

This article is a good resource for those who want to know more about the most raised question – Should the prohibition in the Digital Millennium Copyright Act against breaking intellectual property safeguards be modified? Read along .. I agree to the general consent that DMCA should be amended to shift its view from complete…

All Articles

Making Government documents transparent

There are so many articles about e-governance, but all these articles stress on what e-governance can do, with little thought on how and when e-governance systems should enclose and disclose information to the public. This article is different from all articles and lays down specific view as to when and how government documents could be…

All Articles

Overcoming Competing Commitment

“Competing commitment and how to overcome it” – A review of work done by Kegan R. and Lahey L. L. Overcoming employee resistance has been and is one of the main issues that every manager face in his day-to-day functions. Whether it is Information systems department or customer service department or marketing or production or…

All Articles

Preparing Marketing Plans – Sample one for Amazon.com – A handy tool for strategic IT managers

Overview Amazon.com offers Earth’s largest selection of online products. Being the #1 online retailer, it offers the most advanced and innovative ways of e-commerce that is capable to continuously deliver fastest, reliable, cheapest and most user-friendly online shopping experience for the customer. Marketing Strategy Focus and Market Segments Company’s mission is to become extremely customer-centric…

All Articles

Technology Cycles and Innovation

Technology cycles and innovation are two useful phenomena that can be used to explain how competitive advantage of companies can be maintained over time. Technology cycle can be defined as the period of time between the birth or introduction of a new technology and when it is replaced by a newer and substantially better technology….

All Articles

Costs and Benefits of Planning

Planning has advantages as well as disadvantages. This means that even though planning aids in improving organizational and individual performance, it might not work very well all the time throughout the existence of the organization. One important benefit of planning is that it encourages managers and workers to direct their persistent efforts towards activities that…

All Articles

“Cognitive Dissonance” and how to ease it

Cognitive dissonance is an insecure feeling, or lingering doubts, consumers sometimes have after making large purchases. One way to reduce Cognitive dissonance (CD) is to introduce full money back guarantee on dissatisfaction within a stated time period, say 2-3 weeks after purchase. Another way to reduce CD is by allowing product evaluations where the user…

All Articles

Market segmentation

Market segmentation is the process of separating the varied market into segments, each of which has similar characteristics. For example, a cosmetic company may segment its market according to age and sex, thus concentrating on baby lotion (age), adult shampoo (age), after-shave (sex) and eye-liner (sex). The organization could then do research in each segment…

All Articles

Accounting Vs Financial Management

Accounting can be considered as an information system that provides various tools to summarize financial performance or economic activities of an individual, family, organization or any other entity. The reports generated from an accounting system, aids the interested individuals, management, owners and creditors to make intelligent decisions in allocating resources. Financial management is the discipline…

All Articles

Process Control and Process Improvement

Process Management has its relevance when managers begin to conceptualize business activities as interdependent processes instead of functions and tasks. The basic requirement towards effective process management is IT enabled business process automation, usually an outcome of a reengineering task. For the processes to accomplish the set goals, we need to set various standards of…

All Articles

Adopting "Systems View" while Process Improvement

Systems view refers to analyzing a problem situation as a system of interdependent processes that exchange input and output. This view helps to identify the important processes and their relationships as far as maximizing the organizational efficiency and goal achievement is concerned. This leads to the main principle of process improvement which is to emphasize…