Using MIS (10th Edition)
Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
bartleby

Concept explainers

Expert Solution & Answer
Book Icon
Chapter 10.5, Problem 3EGDQ

Explanation of Solution

“No”, the person conducting the study didn’t violate the law.

Reason:

  • The person collect the data for study questionnaire and also she give the assurance for the data privacy.

“No”, the person didn’t do anything unethical either.

Reason:

  • Collecting the data with user permission is not considered as unethical...

Blurred answer
Students have asked these similar questions
Suppose Alice and Bob are sending packets to each other over a computer network. Suppose Trudy positions herself in the network so that she can capture all the packets sent by Alice and send whatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wants to Alice. List some of the malicious things Trudy can do from this position.
Visit the Go-Back-N Java applet at the companion Web site. a. Have the source send five packets, and then pause the animation before any of the five packets reach the destination. Then kill the first packet and resume the animation. Describe what happens. b. Repeat the experiment, but now let the first packet reach the destination and kill the first acknowledgment. Describe again what happens. c. Finally, try sending six packets. What happens?
Consider the following 4-message protocol: A → S: (B, {(A, K1)}KpbS) S → B: A B → S: (A, {(B, K2)}KpbS) S → A: (B, {K2}K1) And the following attack trace: I(A) → S: (B, {(A, K)}KpbS) S → B: A B → S: (A, {(B, K2)}KpbS) S → I(A): (B, {K2}K) Which one of these changes to the protocol messages would fix the attack trace above, such as the attack then becomes impossible: a) 3. B → S: (A, {(B, {K2}KpbA)}KpbS) b) 4. S → A: (B, {K2, A}K1) c) 2. S → B: {A}KpbB d) 2. S → B: B e) 3. B → S: (A, {(B, {K2}KprS)}KpbS) f) 1. A → S: {(B, A, K1)}KpbS g) 1. A → S: (A, {(B, K1)}KpbS) h) 4. S → A: (B, {K1}K2) i) 4. S → A: (A, B, {K2}K1) j) 2. S → B: A, B
Knowledge Booster
Background pattern image
Computer Science
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education