Incident: U.S. defense researcher bought pirated software from Russians, Chinese

Incident: U.S. defense researcher bought pirated software from Russians, Chinese


Description Analysis of the Incident

The software piracy is an ethical and legal issue which has been of a great concern for the software developers and all the entities that are related with the information technology. The incident in this issue that I am going to analyze was discovered though the investigation by the Homeland Security Investigations (HSI) unit of the United States’ Immigration and Customs Enforcement. It was found that the Best was the one of the top customers for the which is a site that sells the pirated software in the year 2008 and 2009.

The Best told the special agents that he has used the software to perform the simulations on the components the MPD was designing for the use in the military helicopters plus the Black Hawk helicopter and the presidential jumbo jet fleet generally referred to as the Marine One. The other projects on which the Best used broken software that included designing the Patriot missile parts the police radars and the breath analysis tools widely used by the American police departments.

The Best was verdict Monday in the United States District Court for the District of the Delaware for plan to commend the criminal copyright contravention. The investigators with the HSI accused the Best of encouraging the Chinese national Xiang Li and the Russian hacker to pirate the copies of the defense modeling programs and the other software.

The Xiang Li and a collaborator sold the cracked copies of the software on the websites including the and the between the April 2008 and the November 2010 according to the court documents. Various software correspondences they sold have the retail values of the $10,000 or the more.

The Best conversed electronically with almost 35 different computer code the crackers and bought more than 60 pirated software titles from the Chinese and the Russian sources, according to the court documents. Li pleaded was guilty in January to one reckon of the conspiracy to commit the copyright contravention and one count of the conspiracy to commit the wire fraud. He was awaiting the sentencing.

The software piracy conspiracy lift up the investigators concerns that the sophisticated representation software a number of which was on a United States restricted export list was going into the wrong hands.

The Best was working on the sensitive government projects and gets into the cahoots with the Chinese national and the Russian cybercriminals. The United States agencies required to be able to the trust their constricting the partners and the Best completely failed in his security concurrences with the government.

The HSI was tipped off to the Li’s actions by a software dealer and the investigation of the agency resulted in an announcement of the cracked software to a number of other dealers. A number of the software dealers had no intimation that their software was getting chinked.

The investigation might lead various software dealers to re-examine their anti-copying security. The agency had sought a three year jail sentence for the Best. The prosecutors said that the Best encouraged the Li and the Russian hacker to pirate the copies of the software for him.

The Best held an underground United States government security authorization the prosecutors wrote in the sentencing document. The Best became very quintessence of a compromised human being known to those who pretended an international menace to the United States. The Best lawyer, Edmund Lyons, said that the criminal the copyright sentences were the typically much shorter than the requested with the recent sentences averaging less than a year.

The HSI examination found that between the April 2008 and the June 2011 the Li sold about the 550 pirated software titles to concerning 325 customers situated in more than the 25 states and more than the 60 foreign countries. The software from almost 200 vendors had a retail value of further than $100 million.


1.   The government should develop strict rules to protect the copyrights for the software so that the companies that develop the software can be develop

2. The colleges and the schools should increase the emphasis on the software piracy in the computer science and the IT courses for the undergraduates.

3. There should be importance of the knowledge about the software piracy and the software copyright regulations and laws in the jobs that involve the use of computer or the software development or software use.


  1. Retrieved November 23, 2013
  2.;jsessionid=218DF599F99E999E8B9287BFF7232AEB?cid=88511 Retrieved November 23, 2013
  3. Retrieved November 23, 2013

What is e Business?

What is e Business?

This is about using technology to improve business process include internal process and external process. There are many activities to use e-business like website marketing, online communication, online training, and trading goods or service. E business has many benefits for organization like more operation hours work, quick communication with more flexibility, company can work 24 hours 7 days.

Why companies should start doing e business?

     It is easy to find out that e business is a new economy. On the other hand, it is a good way to reduce operation cost. Reducing operating cost, it doesn’t mean that operating hours will reduce; companies have ability to work 24 hours 7 days in e business. Many small and mid-size companies managed to start online businesses quite profitably. Companies can provide information for their goods or service easily to customers. That means business can provide customers support effectively. Now days, most respect companies have website and customers can buy product online. In this case, companies have to take care of their website because this website is like company’s image. E business goes globally faster than others with easy entry to market.

    The most two strategy for this kind of business are a product differentiation strategy and low cost strategy. IT developments can affect strategy. The development of the Internet is a typical sketch. It has deeply affected the way many value chain activities are done. For example, the Internet allows organizations to meaningfully rationalize their incoming and outbound logistics actions for products that can be digitized. The Internet dramatically cut costs, thereby helping corporations to implement a low-cost scheme.

IT can help a business implement the five basic competitive strategies. Note the major use of Internet technologies for electronic business and commerce applications. Let’s look at several key strategies that are also implemented with IT. They are: locking in customers or suppliers, building switching costs, raising barriers to entry, and leveraging investment in IT. Investments in information technology can allow a business to lock in customers and suppliers (lock out competitors) by building valuable new relationships with them. These business relationships can become so valuable to customers or suppliers that it deters them from abandoning a company for its competitors, or intimidating it into accepting less- profitable business arrangements. Early attempt to use information systems technology in these relationships focused on significantly improving the quality of service to customers and suppliers in a firm’s distribution, marketing, sales, and service activities (O’Brien & Marakas 2006, 43-44).

By making investments in IT to progress its processes or promote invention, a firm could also upright barriers to entry that would dishearten or postpone other companies from incoming a marketplace. Usually, this happens by growing the amount of investment or the complication of the technology essential to enter in an industry or a marketplace section. Financing in IT allows a firm to build planned IT proficiencies that permit it to take advantage of strategic chances when they rise. In many cases, this outcomes when a firm invests in advanced computer-based information systems to expand the effectiveness of its own business procedures. Then, equipped with this planned technology policy, the firm can influence investment in IT by developing new products and services that would not be imaginable without a strong IT competence. An significant present illustration in the development of corporate intranets and extranets by many firms, which permits them to influence their former investments in Internet browsers, PCs, servers, and client/server, networks (O’Brien & Marakas 2006, 46).

By paying attention to the inter-organizational linkages in the supply chain, a firm can progress its performance by aiding the other establishments in the supply chain to increase their presentation. For example, organization can improve its purchasing and inbound logistics activities by implementing a just-in-time catalogue management system. Organization’s costs are condensed because its buying and inbound logistics actions are done more professionally and because less of its capital is tied up in account. Organization cans earn extra welfares if it links its new systems with dealers to help them do some of their primary value chain activities more professionally and efficiently. For example, by providing more detailed and timely info about its record needs, organization can help its suppliers more efficiency plan their production schedules to meet organization’s need. This reduces their costs, and part of those reductions is likely to be passed on to organization in the form of lower product costs. (Romney & Steinbart 2006, 11-12).

     The great example of actual implementations is Amazon. They don’t have physical store. Amazon offers clothing, electronic, toys and book. Also, Amazon offers new, used and refurbished goods. So, Amazon is the ultimate hub for selling merchandise on the Web.


How Amazon Works


What is eBusiness?

Michael E. Porter. “What is strategy?” (1996).

Oz, E. (2006). Management Information Systems.  Massachusetts, MA: Thomson, Inc.

Reynolds, G., & Stair, R… (2006). Principles of Information Systems. Massachusetts, MA: Thompson, Inc.


IT-Strategies for Transnational Organizations

IT-Strategies for Transnational Organizations

Business/Information Technology are the strategies that are an imperative part of the transnational organizations. The transnational organizations bring the requirements of the information system with the Internet technologies to assist in incorporating the global business actions. The transnational organizations permit the businesses to wander away from the international and the global strategies.

The significance of moving away from the conventional international and the global strategies transact with the confidence on the headquarters for the many processing requirements. Integrating the transnational the business strategies permits for the information systems to be incorporated rather than having the independent or the centralized information systems. The transnational organizations have an international vision, but transnational organizations make specially their accomplishments to incorporate with those of the local regions.

The Information Technology strategies for the transnational organizations comprise:

  1. The Virtual business process via the global alliance
  2. The world markets and the mass customization
  3. The global electronic commerce and the customer service
  4. The transparent production
  5. The global supply chain and the logistics, and
  6. The dynamic resource management.

The Information technology features consist of:

  1. It is logically consolidated
  2. It is physically distributed
  3. It is Internet connected
  4. It is common global data resources
  5. It is integrated international enterprise systems
  6. The Internet, intranet, extranet, and Web based applications are use, and
  7. The transnational IT policies and standards are used.

The Transnational organizations have a proper management approach in setting the strategies. The managers of the Transnational organizations have focus on incorporating the business strategies throughout the cooperation at the headquarters and the internationally. The Transnational operations are complimentary of their capability to provide dependable information to a lot of locations through the collaboration. The high levels of the collaborations allow the companies flexibility to get used to their host markets.


  1. Working with one service provider decreases the cost and the complexity of managing the different services in the each location.
  2. Gives networked Information Technology resources to the new locations rapidly and professionally, without having to set up and attach with a new association infrastructure.
  3. In the event of a tragedy in one the place, the domestic company is not reliant upon the limited local Information Technology resources for the revival.


  1. One obstacle to victorious the transnational operational strategy is the divergence in the technological communications from the local company to the global company.
  2. The cost of the technology infrastructure
  3. The reliability
  4. No meeting the least amount the standards of the local organization
  5. The technological dilemma causing gaps in the service levels and the transfer of work


  1. Retrieved: 09 November 2013
  2. Retrieved: 09 November 2013
  3. Retrieved: 09 November 2013

Business Intelligence (group 3)

This blog will give students general information of Business Intelligence (BI) systems. And we will write a bout some point of Business intelligence systems like benefits, cost, and example for it.


Business intelligence systems (BI) are type of technology can help any organization to improve their goals with less risk. Business intelligence systems is put strategies and information that a company have to use it to improve their organization in market during the analyses information like industry analysis, competitor analysis, and threat analysis, and support decision making for manager or any person or any stokeholds. For the definition of business intelligence system we would like to say its can provide any people by information that looking for ether manager, investors, or owns, and this technology can help them to get the write decision with efficiency and effectively.


Business Intelligence systems proved many benefits to organizations.  Some of these benefits are tangible and others more intangible. Those benefits can help gain competitive advantage, so we will discuss some of the benefits

Improvement: BI systems can provide managers and professionals about what they missing or what they need to improve themselves or to improve their skills. like using  analysis of data resources.

Decrease expenses: BI can remove some of steps that are not necessary in operating. Data leads to reduces expenses by remove those steps, when it reduce the expense it will lead to increase profit

Easier report: managers can get their report wherever they are such as working in office or not, therefore it helps mangers and professional to work even if they far away of their office.

Improve sales: BI system can help to know sales’ weakness and try to rebuild it then management can improve sales in organization.


Software cost: 

Many people think software cost that more software licenses for more people means more many but actually it depends on company, which means more number of licensing required to efficiently run their BI system more cost. It is easy to large company to discount on licensing. Also software licenses are only part of the cost of business intelligence.

Hardware cost:

It depends on which technology chosen. User and data those two important thing should consider it on business because” each additional user

Can demand a marginal increase of anywhere from 10-50% in hardware resources, which includes disk, RAM, and CPU required to run BI software”

Culture issues 

Inclusion: people love to be included, and it sense of belonging.

Communication and collaboration: any good company should have good communication and collaboration to success that includes easy translation to any another languages.

Ownership: that makes people feel like they are a part of this unity. they involve to achieve firm’s goals.

Recognition: it is about acknowledge and reward accomplishment and it depends on how is done.

Trust: it is about reducing find a scapegoat.

Implementation issues

Implementing a business intelligence system requires careful planning to assure that it meets expectations. These are the basic steps:

  1. Identify End-User Requirements
    it is important to get the requirement from End-Users by their answers for some questions.
  2. Identify the Data Sources
    this part is depending on first step that identify the sources of the data that can provide the answers.
  3. Design the Data Model
    End-Users needs and expectation should be supported by logical data
  4. Create the Data Store
    the data store is an analytic workspace.
  5. Generate the Summary Data
    the data can ce summarize at various levels.
  6. Prepare the Data for Client Access
    it is to find out what data is available ,and where and how to get it.
  7. Grant Access Rights
    granting views and manipulates the data.
  8. Distribute the Client Software and Documentation
    in this step, you should provide documentation to your end users.
  9. Create and Distribute Reports
    it is about develop reports and share them with the user community.Example
    I-pad is considered a big example for BI. it is easy to see how many executive mangers have this kind of devise, and that let them know about
    data and information. They are able to connect with their company anytime, everywhere, and can correct problems before the problems will be out of control.