Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
1st Edition
ISBN: 9781305657458
Author: Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 12, Problem 2IR
Program Plan Intro
Given Information:
- Few policies are created for an employee to follow during social media participation.
- Intel policy is given that an employee requires to disclose his/her identity and company’s confidential information.
- Apple policy states that an employee requires to disclose from discussing company about their own websites and posting messages to the social media related to the company.
Corporate policies of “FORD” in participating social media:
- The first social media policy of ford is “Use your common sense”; the employees can add value in social conversation and they must keep it cool.
- Second policy is “Beware of privacy issues”, the employees should know how to use social media without any privacy problems.
- Third policy is “play nice and be honest”, the employee can perform any general operation like uploading and sharing only legal information and keep those information in private.
Corporate policies of “IBM”:
- The first policy says that the employees can be given clear guidelines about what cannot be shared and how the employees can communicate through social media.
- The second policy encourages the employees to express themselves to shine on social media by allowing them to share their new ideas and skills on social media.
- The third policy implies that the employees are allowed to share their concept via blogging and social media.
Explanation of Solution
Justification for the nature of policies:
- Consider the first policy of IBM, it indicates that the employee should share only the information which should not lead to any security issues.
- This can be considered as lenient policy as it allow the employees to share the information with others through social media in order to achieve company’s growth.
- Similarly, the same policy may be considered as too strict when the employee shares the confidential information as it could leads to a serious problem...
Explanation of Solution
Actions that are taken for an employee when they violate the policies:
- An employee can be notified by a formal written notification that an employee has violated from the rules and policies...
Explanation of Solution
The ways that policies differ among healthcare and education:
Policies in Health Care | Policies in Education |
The healthcare policy is defined as planning, decisions and actions that are processed to achieve healthcare goals within a society. | Policies in education are defined as collections of rules and principles for governing education systems. |
An employee working in a healthcare field is subjected to security issues in case of breaching patient’s information to other patients except doctors... |
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Computer Ethics and Law Subbject.
Thak you in advance.
Is it ethically acceptable or ethically prohibited for an advocacy group to launch a socialbot on a social media system that pretends to be a person and subtly promotes the group’s viewpoint? Consider the same question for a socialbot that promotes a particular company’s products.
Individuals are extremely fond of digital social networks (such as Facebook and Twitter). Determine why people will choose digital social networking over informal social networking, and vice versa. Make a list of mental health issues that may develop as a result of excessive usage of digital social networking sites. Is there ever a reason to be worried about getting hooked to online activities? Find one example of a person who was "addicted" to utilizing a social networking site or other online activity in a news or journal article.
Consumers who already have access to a significant lot of personal information may feel uncomfortable making purchases on a social media network like Facebook due to the various privacy issues this presents.
Chapter 12 Solutions
Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Ch. 12 - Prob. 1SGCh. 12 - Prob. 2SGCh. 12 - Prob. 3SGCh. 12 - Prob. 4SGCh. 12 - Prob. 5SGCh. 12 - Prob. 6SGCh. 12 - Prob. 7SGCh. 12 - Prob. 8SGCh. 12 - Prob. 9SGCh. 12 - Prob. 10SG
Ch. 12 - Prob. 11SGCh. 12 - Prob. 12SGCh. 12 - Prob. 13SGCh. 12 - Prob. 14SGCh. 12 - Prob. 15SGCh. 12 - Prob. 16SGCh. 12 - Prob. 17SGCh. 12 - Prob. 18SGCh. 12 - Prob. 19SGCh. 12 - Prob. 20SGCh. 12 - Prob. 21SGCh. 12 - Prob. 22SGCh. 12 - Prob. 23SGCh. 12 - Prob. 24SGCh. 12 - Prob. 25SGCh. 12 - Prob. 26SGCh. 12 - Prob. 27SGCh. 12 - Prob. 28SGCh. 12 - Prob. 29SGCh. 12 - Prob. 30SGCh. 12 - Prob. 31SGCh. 12 - Prob. 32SGCh. 12 - Prob. 33SGCh. 12 - Prob. 34SGCh. 12 - Prob. 35SGCh. 12 - Prob. 36SGCh. 12 - Prob. 37SGCh. 12 - Prob. 38SGCh. 12 - Prob. 39SGCh. 12 - Prob. 40SGCh. 12 - Prob. 41SGCh. 12 - Prob. 42SGCh. 12 - Prob. 43SGCh. 12 - Prob. 44SGCh. 12 - Prob. 45SGCh. 12 - Prob. 1TFCh. 12 - Prob. 2TFCh. 12 - Prob. 3TFCh. 12 - Prob. 4TFCh. 12 - Prob. 5TFCh. 12 - Prob. 6TFCh. 12 - Prob. 7TFCh. 12 - Prob. 8TFCh. 12 - Prob. 9TFCh. 12 - Prob. 10TFCh. 12 - Prob. 11TFCh. 12 - Prob. 12TFCh. 12 - Prob. 1MCCh. 12 - Prob. 2MCCh. 12 - Prob. 3MCCh. 12 - A(n) _____ report consolidates data usually with...Ch. 12 - Prob. 5MCCh. 12 - Prob. 6MCCh. 12 - Prob. 7MCCh. 12 - Prob. 8MCCh. 12 - Prob. 1MCh. 12 - Prob. 2MCh. 12 - Prob. 3MCh. 12 - Prob. 4MCh. 12 - Prob. 5MCh. 12 - Prob. 6MCh. 12 - Prob. 7MCh. 12 - Prob. 8MCh. 12 - Prob. 9MCh. 12 - Prob. 10MCh. 12 - Prob. 2CTCh. 12 - Prob. 3CTCh. 12 - Prob. 4CTCh. 12 - Prob. 5CTCh. 12 - Prob. 6CTCh. 12 - Prob. 7CTCh. 12 - Prob. 8CTCh. 12 - Prob. 9CTCh. 12 - Prob. 10CTCh. 12 - Prob. 11CTCh. 12 - Prob. 12CTCh. 12 - Prob. 13CTCh. 12 - Prob. 14CTCh. 12 - Prob. 15CTCh. 12 - Prob. 16CTCh. 12 - Prob. 17CTCh. 12 - Prob. 18CTCh. 12 - Prob. 19CTCh. 12 - Prob. 20CTCh. 12 - Prob. 21CTCh. 12 - Prob. 22CTCh. 12 - Prob. 23CTCh. 12 - Prob. 24CTCh. 12 - Prob. 25CTCh. 12 - Prob. 26CTCh. 12 - Prob. 27CTCh. 12 - Prob. 28CTCh. 12 - Prob. 29CTCh. 12 - Prob. 1PSCh. 12 - Prob. 2PSCh. 12 - Prob. 3PSCh. 12 - Prob. 4PSCh. 12 - Prob. 5PSCh. 12 - Prob. 6PSCh. 12 - Prob. 7PSCh. 12 - Prob. 8PSCh. 12 - Prob. 9PSCh. 12 - Prob. 10PSCh. 12 - Prob. 11PSCh. 12 - Prob. 1.1ECh. 12 - Prob. 1.2ECh. 12 - Prob. 1.3ECh. 12 - Prob. 2.1ECh. 12 - Prob. 2.2ECh. 12 - Prob. 3.1ECh. 12 - Prob. 3.2ECh. 12 - Prob. 1IRCh. 12 - Prob. 2IRCh. 12 - Prob. 4IRCh. 12 - Prob. 5IRCh. 12 - Prob. 1CTQCh. 12 - Prob. 3CTQCh. 12 - Prob. 4CTQ
Knowledge Booster
Similar questions
- The usage of mobile phones makes our lives much easier, but will the misuse of modern technology make our lives less convenient? Because some individuals have used camera phones irresponsibly to take incriminating images in parks and other public places, numerous fitness centers, public bathrooms, and other types of facilities have outlawed the usage of camera phones. Because of dishonest students who use their phones to cheat on tests and the frequent text messaging that goes on in many classes, mobile phones have been made illegal. Do you consider these reactions from your cell phone to be appropriate? Is it possible to prevent improper mobile phone use in a public setting without resorting to outright prohibition? Should there be more severe consequences for those who abuse technological tools?arrow_forwardA number of cybersecurity experts believe fingerprinting is a kind of abuse that exposes consumers' privacy concerns. Anti-browser fingerprinting technologies are included into several browsers. Provide an explanation of how each browser prevents fingerprinting.arrow_forwardTheft of one's identity is one of the most common forms of cybercrime, and each year it affects millions of individuals all over the world. Provide an explanation of how identity thieves obtain your personal information by using the internet, as well as the preventative measures you should take to avoid having your identity stolen by such criminals.arrow_forward
- Social Engineering Reference Sheet Which of the following best describes: PHISHING? an act of pretending to be another person for the purpose of entertainment or deception. hackers and attackers of all types imitate people, companies and even computers with the intent to trick people into giving up personal information in order to gain access to something valuable. a kind of attack where a social engineer will use a false promise or reward to trap victims and steal their sensitive information by infecting their system with malware the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers. to trick into believing or accepting as genuine something false and often preposterous Which of the following best describes: HOAXES? the fraudulent…arrow_forwardimprovements to be made on social media privacyarrow_forwardSocial media also poses certain risk especially in the dissemination of false information. Discuss how will you use social media to ensure that you do not propagate inaccurate and unreliable information?arrow_forward
- Individuals like using digital social networks (such as Facebook and Twitter). Determine why people choose digital social networking over informal social networking or vice versa. List any mental health issues that may occur as a result of excessive usage of digital social networking sites. Is it ever necessary to worry about being hooked to Internet activities? Find one example of a person who was "addicted" to utilizing a social networking site or other online activity in a news or journal article.arrow_forwardOne of the most common types of online crime is identity theft. Explain the many ways in which your identity might be stolen by hackers, and state the precautions you believe should be taken to protect yourself against identity theft committed by cybercriminals.arrow_forwardUSER INTERFERENCE QUESTIONImagine that you’ve been tasked with redesigning (you being a redesigner) (edits) a website contents, text, image or documents. Report 4 reasons of: What is the user (you, the redesigner) trying to accomplish? Report 4 reasons of: What specific actions is the user (you, the redesigner) taking to try and reach that goal? Report 4 reasons of: What pain points do they encounter; that is, what actions seem to be difficult or inefficient? please dont copy paste previous answersarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning