Business Driven Technology
Business Driven Technology
6th Edition
ISBN: 9780073376905
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
Expert Solution & Answer
Book Icon
Chapter 16, Problem 4MBD

Explanation of Solution

Selection of music:

The selection of music is entirely depends on the personal opinion. Some people may like Jazz, others may like Rock while other part of people may like Hip Hop and moreover selecting this is the personal like or dislike of an individual people.

Therefore, selection of music is private information of the people.

Usage of personal information unethically:

The private information is accessed by the unauthorized person that can be unethical one. The below mentioned points are unethically used the private information by the people.

  • The un-social element can find this information and use to cheat the other people by pretending them that they shares the same music and creating a links with them which can further result in some criminal activities.
  • Depending upon the music preferences a lot of personal information can be found about the listeners and this making them disposed to many unwanted marketing and other activities.
  • This information can be sold to many music companies without the permission of the listeners so that these companies can directly contact these people for the promotion of their music albums.

Justification for threatening the information from Pandora:

Yes”, it is threat to Pandora online musical company...

Blurred answer
Students have asked these similar questions
 FolderHomework 1InstructionsHomework 1 emphasizes using professional networking sites such as facebook. In this homework, you will:create and use a fb to interact with friendsNote: For these activities within fb, you are welcome to include your professor and other students in the class. However, you do not have to. You are welcome to just use your known friends.specific activities for this homework include:If needed, create yourfbLogin and complete and personalize your profile.While completing your profile, be sure to include current and previous position, education, personal and additional information as appropriate.Find connections to your friendsResearch a couple of companies you might be interested in seeking employment with in the future.Configure and customize your privacy settings in fb
JavaScript Create a non-predictive T9-like keypad. For those who do not know what a T9 keypad is, it is essentially a more compact keyboard for mobile phones that requires you to perform multi-presses to choose letters you want to spell your words with (technology that may be older than some of students). If you are unfamiliar with the user interface, use the following shell in an html file to get a sense of what it looked like on older mobile phones: // html T9 Keypad abc def ghi jkl mno pqrs tuv wxyz How it functions for the assignment: If a button contains a letter you want to type, click on the button N number of times associated to the order the letters are in. So if you wanted "c", you push the second button 3 times. If you push the button more than the number of letters in the button, it will wrap-around and return the letter after. For example, clicking the first button (that has letters a, b, and c) 5 times returns "b". The input field only appends the letter to once…
Facebook is one of the most popular social networks where users can post posts to different (text or image) and comment on them • Each user must register beforehand in order to use the system. The user is identified by a name, surname, date of birth, email address (which will also serve for authentication) and a password. • Any user can make a post which contains a text and/or image. Post is identified by a unique code, text used, an identification code for the image and date of post. • A user (including the author of the post) can comment on the post. The comment is characterized by an identification code, text, and date of post. Also, a user may like a comment or post. The system should keep track which user has liked the post/comment, etc. • Users can also exchange messages with each other. Each message is characterized from the unique code, text, date and time of sending as well as information if the recipient has seen the message or not. Write the rational schema, normalization -…
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Text book image
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning