IT 322 Reviewer
IT 322 Reviewer
1. Plagiarism is a type of intellectual theft. Plagiarism can take many forms, from deliberate cheating to
accidentally copying from a source without acknowledgement. Consequently, whenever you use the words or
ideas of another person in your work, you must acknowledge where they came from.
Stealing someone’s ideas or words and passing them off as one’s own
Many students:
-Do not understand what constitutes plagiarism.
-Believe that all electronic content is in the public domain.
Plagiarism is also common outside academia.
Plagiarism detection systems
- Check submitted material against databases of electronic content.
2. Reverse engineering, sometimes called back engineering, is a process in which software, machines, aircraft,
architectural structures and other products are deconstructed to extract design information from them. Often,
reverse engineering involves deconstructing individual components of larger products. The reverse
engineering process enables you to determine how a part was designed so that you can recreate it. Companies
often use this approach when purchasing a replacement part from an original equipment manufacturer (OEM)
is not an option. The reverse engineering process is named as such because it involves working backward
through the original design process. However, you often have limited knowledge about the engineering
methods that went into creating the product. Therefore, the challenge is to gain a working knowledge of the
original design by disassembling the product piece-by-piece or layer-by-layer.
Reverse Engineering
Applied to computer:
- Hardware
- Software
Convert a program code to a higher-level design.
Convert an application that ran on one vendor’s database to run on another’s.
Compiler
-Language translator
-Converts computer program statements expressed in a source language to machine language.
Software manufacturer
-Provides software in machine language form.
Decompiler
-Reads machine language
-Produces source code.
Courts have ruled in favor of reverse engineering:
-To enable interoperability.
Software license agreements forbid reverse engineering.
Ethics of using reverse engineering are debated
-Fair use if it provides useful function/interoperability
-Can uncover designs that someone else has developed at great cost and taken care to protect.
3. Open-Source Code
4. Competitive Intelligence
Sometimes referred to as corporate intelligence, refers to the ability to gather, analyze, and use information
collected on competitors, customers, and other market factors that contribute to a business's competitive
advantage. Competitive intelligence is important because it helps businesses understand their competitive
environment and the opportunities and challenges it presents. Businesses analyze the information to create
effective and efficient business practices.
5. Trademark Infringement
A trademark is a logo, package design, phrase, sound, or word that enables consumer to differentiate
one company’s product from another’s.
Trademark owners can prevent others from using the same mark or a confusingly similar mark on a
product’s label.
Organizations frequently sue one another over the use of a trademark on a Web site or domain name.
Nominative fair use is a defense often employed by defendant in trademark infringement case.
6. Cybersquatting
Cyber squatters
-Register domain names for famous trademarks or company names
-Hope the trademark’s owner will buy the domain name for a large sum of money.
To curb cybersquatting, register all possible domain names
-.org, .com, .info.
Internet Corporation for Assigned Names and Numbers (ICANN)
- Several top-level domains (.com, .edu, edu., .gov, .int, .mil, .net, .org,
aero, .biz, .coop, .info, .museum, .name, .pro,
.asis, .cat, .mobi, .tel, and .travel)
- Current trademark holders are given time to assert their rights in the new top-level domains before
registrations are opened to the general public
- Anti-cybersquatting Consumer Protection Act allows trademark owners to challenge foreign cyber
squatters.
OFFSHORING
“Outsourcing can be defined as designating the use of goods and services produced outside the enterprise.”
Outsourcing can occur within the country where the enterprise is located(domestic outsourcing) or abroad
(outsourcing abroad/offshoring)” (OECD, 2007).
Offshoring is defined as the transfer of worker’s productivity to abroad as part of outsourcing or as part of an
in-house transfer of work.
WHY OFFSHORING?
Offshoring allows US companies to capture economic values by creating markets jobs, and production of
goods in other countries.
OFFSHORING ARENA
Major jobs offshored are the fields of information technology, financial services, human resources, purchasing
and manufacturing.
TYPES OF OFFSHORING
Production Offshoring
the relocation of physical manufacturing processes to another country while services offshoring is the
relocation of a company's administrative and technical services such as accounting and finance, human
resources, sales services, and software development.
IT enabled Offshoring
Innovation Offshoring
- a management practice that sources innovation input abroad and coordinates innovation activities across
borders either within firms or with external partners.
MODELS OF OFFSHORING
Global Shared Services- Mass insourcing, something like captive centres, this followed primarily to
combine internal operations to large centers.
Hybrid Model- Known as “Dual Shore” -30% work onsite(requirement gathering, client interaction) and
70% offshore( coding, testing and fixes).
Multi-sourcing model- Having multiple off-shores to get wide range solutions or “best-of-breed”
strategy.
Global Delivery Model- Also termed as blended outsourcing, this model has advantage of backup
delivery locations in case of failures.
Build-operate-transfer Model(BOT)- company can create a shared services or development center in
offshore and manage it for a limited period of time by signing a contract with an offshoring
corporation. This ensures quick time to achieve stability in the project progress.