Ocasio_Assignment #2
docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
STEM100
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
4
Uploaded by ocasio703
Miguel Ocasio Assignment 2
American Military University
Chapter 2 A Google Latitude app was also rejected by Apple. Google Latitude lets you share your location with friends. Apple rejected this app too, saying it violated privacy guidelines(Coursey, 2009). To
protect user privacy and ensure that location data is shared in accordance with Apple's policies, Apple made this decision. Open innovation encourages developers to build apps that integrate with other platforms and services. Developers can leverage existing platforms and technologies, fostering innovation. It encourages experimentation and creativity, which leads to more diverse and feature-rich apps, say proponents of open innovation. The choice between the collaborative and open innovation models depends on our primary goal if we're building a collaborative platform. The open innovation model might be a better choice if we're trying to maximize innovation(Bixby, 2021). Collaboration and integration allow for the pooling of resources and expertise, leading to innovative app solutions. If we're just trying to make money, the collaborative model may be better. Apps are aligned with Apple's vision for the iPhone by tightly
controlling the development and approval processes. As a result, you'll have better-looking, more
user-friendly apps. Developers can also make a lot of money from in-app purchases and app subscriptions. Chapter 3
Lack of transparency and disclosure is one of the biggest causes of IPO abuses. It's crucial for regulators to enforce disclosure requirements. It can be done by requiring investment banks to
provide comprehensive and accurate information about IPOs, risks, and underwriting fees. Investors can make better investment decisions by requiring full disclosure, which minimizes overpaying. It's also important to enforce stricter regulations to stop IPO abuses. These regulations should prevent investment banks from price gouging and front-running. Specifically, regulators should mandate fair pricing procedures so that IPO prices are determined by objective market factors rather than inflated by self-interested entities(Metz, 2023). Furthermore, investment banks should be banned from selling stock in their own accounts before prices stabilize, a practice that can lead to unethical profits and unfair advantages. IPO abuses can be effectively combated by strengthening market surveillance mechanisms. A dedicated regulatory body or taskforce can do this by investigating potential abuses. These bodies should have enough
resources and expertise to investigate thoroughly, identify wrongdoing, and enforce. Market surveillance should also involve collaboration with relevant stakeholders, like institutional investors, stock exchanges, and market participants(Metz, 2023).
There's a complicated relationship between the CSA, USA PATRIOT Act, and FISA. Despite focusing on different aspects of law enforcement, all three laws aim to protect the public from domestic and foreign threats(National Intelligence, 2015). CSA was enacted to protect sensitive data on federal computers(Duigan, 2023). It also recognizes the importance of collaboration between law enforcement and the intelligence community(TripWire, 2020). As a result of the USA PATRIOT Act, federal agencies had more powers to collect and share intelligence related to
detection and prosecution of international money laundering and financing of terrorism. That means investigations can go much faster, operations can get messed up, and people can be caught. FISA, on the other hand, protects individual privacy while allowing intelligence agencies
to spy on foreign threats(FINCEN, 2017). The act lays out strict guidelines for justification,
scope, and oversight of surveillance. Although FISA is mostly about gathering foreign intelligence, it indirectly impacts drug trafficking investigations by authorizing surveillance activities that could be used to investigate drug trafficking groups that are linked to foreign intelligence agencies. To sum up, the USA Patriot Act, the Computer Security Act of 1987, and the FISA act all play a huge role in computer security, terrorism, and intelligence gathering. It laid the foundation for computer security legislation, but it wasn't enough to deal with the evolving cyber threats of today(TripWire, 2020). In the USA Patriot Act, measures were introduced to enhance law enforcement's ability to investigate and prosecute terrorism-related crimes, but privacy and civil liberties were raised(Duigan, 2023). Despite its potential impact on individual rights, FISA established procedures for intercepting electronic communications that have a national security purpose(FINCEN, 2017).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
References:
Bixby, J. (2021, January 7). Council post: Experimentation is the key to innovation and developers make it happen. Forbes. https://www.forbes.com/sites/forbestechcouncil/2021/01/08/experimentation-is-the-key-to-
innovation-and-developers-make-it-happen/?sh=174a96e950af Coursey, D. (2009, July 24). Crippled google latitude web app spotlights iphone fault. PCWorld. https://www.pcworld.com/article/524465/crippled_google_latitude_web_app_spotlights_iphone_
fault.html Duigan, B. (2023, October 25). USA PATRIOT Act. Encyclopædia Britannica. https://www.britannica.com/topic/USA-PATRIOT-Act FINCEN. (2017, June 10). USA PATRIOT Act. USA PATRIOT Act | FinCEN.gov. https://www.fincen.gov/resources/statutes-regulations/usa-patriot-act Metz, J. (2023, March 14). Main causes of IPO & SPAC Failures & Tips to avoid. Bridgepoint Consulting. https://bridgepointconsulting.com/insights/ipo-spac-difference-failures-
causes-tips-preparation-success/ National Intelligence. (2015, June 23). Foreign intelligence surveillance act. INTEL. https://www.intelligence.gov/foreign-intelligence-surveillance-act TripWire. (2020, December 1). A look at the computer security act of 1987. Tripwire. https://www.tripwire.com/state-of-security/computer-security-act-of-1987