User:Itungangga

Hi, my name is Itung Angga, I'm from Indonesia. I am student of CIS 002 in De Anza. I love listening to any kind of music. :)

For the Mid-Term, we talked about the millennium development goals (MDG) have been strategically thought and calibrated as the most potential ways to avert the threat underlying the goals to be achieved. The United Nations (UN) in the endeavor to curb the severity of the challenges faced by a large proportion of the world population, has systematically convened and deliberated on the menace issues of concern. One of the topics that have been given an upper hand in the move to seek solution is environmental sustainability as the seventh goal of MDG. Why is this topic important? The main and obvious reason is to attain a clean environment for the present and the future generation is what has been termed as sustainability. The UN has relentlessly called upon all the earthly seven billion population to become agents of environmental sustainability. The bottom line for this mass campaign and emancipation is that this is the current population who bear by a large percentage stand to gain the most with an extrapolated benefit on their descendants.

1. Introductions
1. http://www.forbes.com/sites/tanyaprive/2012/12/19/top-10-qualities-that-make-a-great-leader/

This article talks about 10 qualities of being a leader. The qualities that a leader should have is honesty, it is true that honesty is the best policy, since you are responsible for a team. As being a leader you have to take care of your actions, as you have bigger responsibility. It is to say that this article is really helpful towards seeing meaning of being a leader.

2. http://www.arjournals.org/index.php/bjdmn/article/view/1639

The article considers Privacy association analysis as key to unmasking relationship in Big Data without abusing privacy. The approach has rule hiding algorithm protecting privacy. I found this source fascinating because it offers an approach that hide particular data privacy is protected while ensuring better outcomes.

3. http://www.indianjournals.com/ijor.aspx?target=ijor:ijdmet&volume=5&issue=1&article=003

For me it emphasize protection of privacy from leaking when mining huge data as crucial. I found the paper interesting because it elaborates a number of privacy preserving techniques used in mining distributed database which includes secure multiparty computation, k-anonymisation approach, condensation model and cryptographic approach while in the same time provides the analysis of the merits and/or demerits of the approaches.

2. Privacy and Freedom of Speech
1. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2584123

This article by Toni M Massaro describes US Supreme Court present and past view over public employees’ speech. The author uncovers that enjoy less enforceable free speech rights at workplace. The article stated that existing law (First Amendment) only allow freedom of speech to public employee if issues area “matter of public concern. Furthermore, a matter of public concern speech is also limited. What is interesting about this article is that it criticizes the courts difference over public workers anticipation to disruption as the reason for discipline because Toni thinks it inadequately protects the based on free speech.

2. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2478873

This article justifies the significance of protecting freedom speech in free countries. Bhagwat asserts that even autocratic leaders find it necessary to protect right to free speech because it assures internal controls, citizens and/or workers can burst corruption, and abuse of office. He also stated that some degree of freedom help fortify legitimacy of leadership. I like the fact that this article unmasks importance of freedom of speech in a democracy.

3. . http://onlinelibrary.wiley.com/doi/10.1111/j.1564-913X.2014.00197.x/abstract;jsessionid=3029123C044E80B36954E731737811BE.f03t04?userIsAuthenticated=false&deniedAccessCustomisedMessage=

Festerling and David provides critical differences between leaking, and whistleblowing with much concern placed on protecting the discloser. The article discusses provisions of the international convention over human rights as well as corruption while comparing the approaches applied in protecting freedom of speech in US, France and UK.

3. Intellectual Property
1. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2126845

The paper presents presents challenges where computer programs compromise contract law in an effort to set intellectual property rights. The author argues that software developers evade intellectual property laws and assume license that puts users under strict provisions than copyright such as bargained agreements for custom software as well as unbergained (shrinkwrap)license which allow massive sales. The author discusses the theories in favor of shrink-wrap licenses and against. Interestingly, he finds it unlawful for shrink-wrap to replace property rights provided in federal law.

2. http://link.springer.com/chapter/10.1007/978-3-662-43871-8_190#page-1

In this article, Gong & Jiaojiao emphasize independent intellectual property rights which is a drive for individuals civic rights to celebrate the fruits of their labor especially in hi-tech.

3. http://onlinelibrary.wiley.com/doi/10.1111/joie.12022/abstract?userIsAuthenticated=false&deniedAccessCustomisedMessage=

Bhattachary & Sergei argues that the model of the bilateral trade in IP remain incomplete especially sequential investment in quality as well as financing limitations. The authors suggested novel formulation of ex ante control rights IP purchaser, over the seller who is restrained by financial limits. The article also imply the credibility of enforcement of such control rights.I find the approach quite good unlike the previous model allowed inventor to loss control over their property after selling to a financially able buyer.

4. Crime
1. http://psycnet.apa.org/psycinfo/1990-97753-000 The authors investigate the vital nature of crime, finding that experimental and well known conceptions of acts of crime are deluding, and they evaluate reality of crime based on disciplinary claims, reasoning that such claims are not in line with the nature of the crime behaviors and, interestingly enough by the data generated by disciplines themselves.

2. http://dl.acm.org/citation.cfm?id=2655330

The book incorporate depictions of the sorts of crime as well as terrorism perpetrated utilizing hi-tech, theories tackling the issue of hackers and different sorts of advanced digital crime, a overview of legitimate techniques alongside strategies focusing on this kind of crime, and intensive covering of the scope of examining and scrutinizing digital crime as well as terrorism, and cyber warfare. Endless supply of the content, allowed me prepare better for further study into the developing issues of crime, terrorism and cyber warfare being submitted utilizing smart devices and the internet.

3. http://www.tandfonline.com/doi/abs/10.1080/10511259300086201

Justice, Crime and ethics successfully addresses dilemma accompanying delivery of justice and professional programs in the discipline. The book comprehensively captures law enforcement force and legal provisions in crime control. I find it resourceful in writing my project on this topic.

5. Employment, Entertaiment and Education
The paper highlights significance of education in enhancing re-employment to employees, effects of education specifically after 12 to 16 years of studying based on consistent data set as well as instruments. Interestingly, Riddell and Xueda finds out that the effect of education to unemployment mixed up
 * 1) http://www.sciencedirect.com/science/article/pii/S0927537111000054

2. http://onlinelibrary.wiley.com/doi/10.1002/9781118900772.etrds0176/abstract;jsessionid=3952E92777F0265FDC00A671175ED175.f03t03?userIsAuthenticated=false&deniedAccessCustomisedMessage=

Solga Heike unmasked employment as well as wage disparities among educated people in developed economies which is a focus socioeconomic studies. He addresses labor market vulnerability less skilled, factors that trigger education and employment prospect disparities. I find this study significant since it brings into the lime light issues face by less educated people in the labor market and approaches to overcome the challenges.

3. https://lup.lub.lu.se/student-papers/search/publication/7362768

Karlsson & Ama Larsson investigates possibility of effects of time spent schooling to women’s employment prospects as well as employment intensity using disparities across various countries and focus in bringing schooling changes. It is fascinating to understand that schooling induce negative effects to employment intensity among women reasonably due to attitudes towards employed women, domestic duties, policies and so on. The focus of the paper is women education, employment and inequalities.

6. Mid-Term Project
This paper applies for the Mid-Term, we talked about the millennium development goals (MDG) have been strategically thought and calibrated as the most potential ways to avert the threat underlying the goals to be achieved. The United Nations (UN) in the endeavor to curb the severity of the challenges faced by a large proportion of the world population, has systematically convened and deliberated on the menace issues of concern. One of the topics that have been given an upper hand in the move to seek solution is environmental sustainability as the seventh goal of MDG. Why is this topic important? The main and obvious reason is to attain a clean environment for the present and the future generation is what has been termed as sustainability. The UN has relentlessly called upon all the earthly seven billion population to become agents of environmental sustainability. The bottom line for this mass campaign and emancipation is that this is the current population who bear by a large percentage stand to gain the most with an extrapolated benefit on their descendants.
 * 1) http://econtent.hogrefe.com/doi/abs/10.1027/1864-1105/a000031?journalCode=zmp

7. Evaluating and Controlling Technology
Alzain, Ben and Eric analyze as well as evaluate existing multi-cloud database (MCDB model) which uses multi-cloud service providers. The study is majorly concerns with cloud computing security. The article addresses the adopted triple modular redundancy (TMR) tactics and sequence approach to design database that is trusted. It also explores Shamir’s shared algorithm. Evaluation was executed utilizing cloud computing toolkits.
 * 1) http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6980798&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6980798

2. http://link.springer.com/article/10.1007/s11036-013-0489-0

This survey evaluates background as well as the state-of-art of big data. Chen, Shiwen & Yunhao access among other things, technology involved for instance cloud computing, the internet of things, data centers as well as hadoop while mush focus is based on four stages of value chain of the big data that is data production, data acquisition, data storage as well as data analysis. Interestingly, for each stage the authors provide background alongside accessing technical issues as well as reviewing the current advances. The evaluation also access data representation such as collective intelligence, online social network and so on while maintain focus on failures and future of big data. It was really resourceful.

3.http://www.sciencedirect.com/science/article/pii/S0925527313000765

This paper is significant in studying the topic because it addresses undesirable outputs, fuzzy data as well as dualrole factors. I find it fascinating because it is the first paper to advocate for an advanced DEA model in evaluation of green supply chain management (GSCM) systems.

8. Risks, Failures and Responsibilities
1.http://www.iaesjournal.com/online/index.php/IJECE/article/view/6928

Today most of the businesses are having extensive volumes of information. Information has scope of Tera bytes to Peta byte. Associations are hoping to handle the development of information. Undertakings are utilizing cloud computing to address the Big Data and investigation as for the collaboration of cloud and big data. This paper shows bid data issues and exploration headings towards the continuous work of handling of huge information in the circulated situations.

2. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6927770&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6927770

Many firms especially SMEs, are confronted with the issue of executing ERP systems in their business because of the way that customary ERP system (Client-Server based ERP system) could be unsatisfactory, couldn't be fruitful to actualize or could even end into a terrible activity. This paper proposes three option approaches for associations to choose from in light of security rate, venture level and hierarchical size. The paper presents the distributed computing innovation keeping in mind the end goal to speak to new non-conventional methodologies for ERP frameworks reception. At last, the paper addresses the correlations between the three introduced methodologies.

3.http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6149560&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D6149560

The article surveys current study related to single v multi-cloud security as well as addressing possible solutions. The authors found that multi-cloud providers have had less concern over security from the research society unlike single clouds. Therefore, the researchers intends to encourage use of multi-cloud because it is less susceptible to security threats and failure that affect cloud computing technology users.

9. Anytime, Anywhere
1. http://arxiv.org/abs/1401.6102

Almeida, Jose and Monteiro advocated use of Web 3.0 in anytime anywhere technology for easier storage and access of information anytime and anywhere. The emphasize web 3.0 as a transition from computing based on information-centric to knowledge centric. This article is really fascinating because it introduces me to significantly new technology that can revolutionizes anytime, anywhere technology and adds value alongside appearance to business models.

2. http://www.emeraldinsight.com/doi/abs/10.1108/09564231311326996

This study explores the concept of value fusion by describing value added to businesses via use of anytime, anywhere technology to complete business-to-consumer and business-to-business transactions and other communication needs. The article argue that anytime, anywhere technology which includes portable devices such as mobile phone, iPhone, IPad and laptops allow businesses, and clients interact, communicate and create value that some businesses and individuals have not conceptualized. The article unravel anytime, anywhere technology as the next technology that shall establish business and consumer networks anywhere.

3. http://link.springer.com/article/10.1007/s11482-013-9283-1

The article argue that mobile technology increase work flexibility as well as permeability, work-life balance and may have consequences such as employee depression, lack of job satisfaction and so on. Nam Taewoo argues that anytime, anywhere technology increases connectivity among the workforce.

10. Technology Advances and Social Trends
1. http://link.springer.com/chapter/10.1007/978-3-540-69073-3_9

The article all address the idea of interactive design approach that produce user interface out of interactive model approach that is easily understandable by humans in dialogues. The model are drawn from theories of human communication thus shall be more understandable by humans than programs using UI.

2. https://www.google.com/patents/US8984505

In his article Ferris asserts that a cloud computing can installed to enable third party, user-managed resources inclusion in the resources available such as cloud application in communication to cloud management systems so that it coordinates access to user-controlled resource. Interestingly, Ferris stated that cloud application can let users specify particular sets of resource that cloud is able to access mainly software and the hardware.

3. http://www.nature.com/lsa/journal/v3/n5/abs/lsa201458a.html

This article explores the advancement of nanophotonic which has offered various avenues for light-matter to interact in a nanometer scale via enriched mechanism for physical as well as chemical reactions initiated by nanometer-confined optical probes at nanocomposite matter. The emerging nanophotonic gadgets and the material allowed experts design disruptive approaches consisting of tremendously increased storage capability of the latest optical memory. This paper is useful because it offers the authors’ perspective of utilization of nanophotonics enabled optical storage tactics as optical storage arrays the future Exabyte data centers.

4. https://books.google.co.ke/books?hl=en&lr=&id=OjKMh_8CVKsC&oi=fnd&pg=PR7&dq=related:qnDsEKu6K0YJ:scholar.google.com/&ots=zDGQs67sEB&sig=2T5uMuj4PG_SCC5T8kjhWKHSwAw&redir_esc=y#v=onepage&q&f=false

This book focus on technology as the major idea revolutionizing surveillance since 9/11.The author emphasize breach of democracy, mutual trust, and personal privacy as result of intensive data mining surveillance systems to an extent of compromising personal liberties.