Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4.6, Problem 4EGDQ
a)
Explanation of Solution
“Yes”, the decision of removing the apps when it considers inappropriate by Google is ethical.
Reason:
Categorical imperative is that in all situations the complete requirements must be followed and it should be acceptable as an end in it...
b)
Explanation of Solution
“Yes”, the decision of restrict permissions for some apps by Google is ethical.
Reason:
Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility.
- According to utilitarian perspective, Google has rights to restrict the permissions o...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Most agree that it is ethical and prudent to shield young children from violent or sexual Internet content by using software filters such content. Some parents of older children have installed computer monitoring software that records all their children's Internet activity. They believe this is warranted because they need to know what their kids are doing online. Do you think it is ethical of parents to do this? Explain your position.
Do we expect that minors under the age of 16 will be protected from harm online by the current regulations? What other measures may governments think about doing if this is not the case?
Do people who use Facebook have a legitimate claim to privacy when they themselves are posting information about themselves?
2. How can using the sharing privacy controls help preserve your privacy on Facebook? In what ways is the sharing control ineffective?
3. How will changing your Connection settings on Facebook help protect your privacy?
4. Why are Facebook’s facial recognition software and policies a potential threat to privacy?
Chapter 4 Solutions
Using MIS (10th Edition)
Ch. 4.4 - Prob. 1NFCQCh. 4.4 - Prob. 2NFCQCh. 4.4 - Why might doctors and nutritionists be interested...Ch. 4.4 - Prob. 4NFCQCh. 4.4 - Prob. 5NFCQCh. 4.4 - Prob. 6NFCQCh. 4.6 - Prob. 1EGDQCh. 4.6 - Prob. 3EGDQCh. 4.6 - Prob. 4EGDQCh. 4.8 - Prob. 1SGDQ
Ch. 4.8 - Prob. 2SGDQCh. 4.8 - Prob. 3SGDQCh. 4.8 - Prob. 4SGDQCh. 4.8 - Prob. 4.1ARQCh. 4.8 - Prob. 4.2ARQCh. 4.8 - Prob. 4.3ARQCh. 4.8 - Prob. 4.4ARQCh. 4.8 - Prob. 4.5ARQCh. 4.8 - Prob. 4.6ARQCh. 4.8 - Prob. 4.7ARQCh. 4.8 - Prob. 4.8ARQCh. 4 - Prob. 4.1UYKCh. 4 - Prob. 4.2UYKCh. 4 - Prob. 4.3UYKCh. 4 - Prob. 4.4UYKCh. 4 - Prob. 4.5UYKCh. 4 - Prob. 4.6UYKCh. 4 - Prob. 4.7CE4Ch. 4 - Prob. 4.8CE4Ch. 4 - Prob. 4.9CE4Ch. 4 - Prob. 4.1CE4Ch. 4 - Prob. 4.11CE4Ch. 4 - Prob. 4.12CS4Ch. 4 - Prob. 4.13CS4Ch. 4 - Prob. 4.14CS4Ch. 4 - Prob. 4.15CS4Ch. 4 - Prob. 4.16CS4Ch. 4 - Prob. 4.17MMLCh. 4 - Prob. 4.18MML
Knowledge Booster
Similar questions
- The CAN-SPAM Act of 2003 was the first law meant to curtail unsolicited email, often referred to as spam. However, the law has many loopholes. Internet service providers (ISPs) and organizations' email administrators use antispam technologies as the front line guards against spam. Although spam still exists, do you think the CAN-SPAM Act has been effective? Why or why not?In what ways does spam affect digital forensic investigations?arrow_forwardlegal aspects of cybersecurity The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.arrow_forward225. Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity b) individuals with no knowledge of codes but an expert in using hacking tools c) who know the consequences of their hacking activities and hence try to prevent them by erasing their digital footprints d) who are employed in an organization to do malicious activities on other firmsarrow_forward
- What is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms.arrow_forwardNearly a decade has passed sinuce the National Academy of Engineers declared Cyber Security a "grand challenge for the next century." Every day there is news on ways in which cyber security challenges and responses are complicating every aspect of our lives. Can the challenge be solved? (40marks) As a first step to solving any problem, one must understand its nature. So, it is important for all cyber security analysts to keep on top of news stories in the field. In this discussion forum we will do just that with the hope that everyone will make it a daily habit throughout their career. Today, some cyber news has been flooded out of the headlines by Hurricane Harvey, but as noted in this article, cyber concerns are front and center as students return to school.arrow_forwardCyberterrorism and cyberespionage pose threats to U.S. national security. Some activities in cyberspace are geared to generate societal fear and uncertainty. Cyberterrorism is seen by many to surpass terrorism as a threat.Answer the following question(s):1. Provide an example of cyberterrorism. How does this example violate norms and rules?2. Does this example pose a threat to U.S. national security? Why or why not?arrow_forward
- 1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk? 2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you? 3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.arrow_forwardA user has an Internet of Things (loT) device that does not have a screen or other user input capability. Which of the following approaches is most likely to enable the user to understandand manage their privacy options? A. Provide privacy information in a document that is clear and transparent so that it is not necessary to provide privacy controls. B. Publish a detailed privacy notice if the device includes features for tracking and surveillance C. Incorporate privacy content on the device that can be broadcast to a smartphone D Clearly label the device with a privacy summary rating.arrow_forwardDo the restrictions that are presently in place offer adequate protections to prevent children younger than 16 years old from being injured online? What further measures may governments possibly think of implementing if this is not the case?arrow_forward
- How well do the present safeguards prevent minors under the age of 16 from being exposed to inappropriate content online? What other choices do governments have, though, if this is not the case?arrow_forwardYou are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting: You should tackle the following points: What is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms.arrow_forwardDescribe software theft. Consider types of software theft. Define software piracy. Define license agreement and single-user license agreement, or end-user license agreement (EULA). List the rights users have, and do not have, upon acceptance of a single-user license agreement. Explain why software piracy continues and why it is a serious offense. Note how software companies have responded to software piracy. Define product activation. Discuss ways that software costs can be reduced for organizations with large numbers of users. Point out the policies that many organizations have governing the use of software. How prevalent is software piracy?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning