EBK USING MIS
10th Edition
ISBN: 9780134658919
Author: KROENKE
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 3.3, Problem 1EGDQ
a)
Explanation of Solution
Kant’s categorical imperative:
The Kant’s categorical imperative is desired by the philosopher “Immanuel Kant” and he defined as that an “imperative” is a something that a person have to do.
For example, suppose a person wants to stop for being a thirsty then he has to drink, so in that ways we can says it is an “imperative”. And this will also know as the categorical /direct imperative.
- Kant’s categorical imperative states that one should behave in such a way that one would want the behavior to be a universal law...
b)
Explanation of Solution
Utilitarianism perspective:
Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility.
- According to utilitarian perspective, using bots on dating site is not ethical as it brings benefits only to the company.
- Customers are harmed financially, because they pay for the service provided by the company...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Can you please help me find an applicable law/s for these three commandments, the specific violation identified, and a Remark (including specific penalties). Here is an example. The law/s should be from the Philippines
Here is the table I should fill out:
Computer Ethics commandment
Applicable Laws
Specific Violation identifiesd
Remarks (include specific penalties)
Thou shalt not use a computer to harm other people.
2. Thou shalt not interfere with other people's computer work.
3. Thou shalt not snoop around in other peoples computer files.
Consider three ethical principles of your choice. What is the best justification of these principles? Consider some reasonable alternative justification of these principles. Why is your justification better? (Remember, if you think your justification is the best, then you must have some reason for thinking so!)
Is it ethical for countries to conduct extensive surveillance of their citizens?
a) If it is ethical, are there any limits to what they can do, and why?
b) If it is not ethical, why is it not ethical? Is it the case that our current justice system is as good as can be done?
Chapter 3 Solutions
EBK USING MIS
Ch. 3.3 - Prob. 1EGDQCh. 3.3 - Prob. 2EGDQCh. 3.3 - Prob. 3EGDQCh. 3.3 - Prob. 4EGDQCh. 3.7 - Prob. 1TARQCh. 3.7 - Prob. 2TARQCh. 3.7 - Prob. 3TARQCh. 3.7 - Prob. 4TARQCh. 3.8 - Prob. 1SGDQCh. 3.8 - Prob. 2SGDQ
Ch. 3.8 - Prob. 3SGDQCh. 3.8 - Prob. 4SGDQCh. 3.8 - Prob. 3.1ARQCh. 3.8 - Prob. 3.2ARQCh. 3.8 - Prob. 3.3ARQCh. 3.8 - Prob. 3.4ARQCh. 3.8 - Prob. 3.5ARQCh. 3.8 - Prob. 3.6ARQCh. 3.8 - Prob. 3.7ARQCh. 3.8 - Prob. 3.8ARQCh. 3 - Prob. 3.1UYKCh. 3 - Prob. 3.2UYKCh. 3 - Prob. 3.3UYKCh. 3 - Prob. 3.1CE3Ch. 3 - Prob. 3.4CS3Ch. 3 - Prob. 3.5CS3Ch. 3 - Prob. 3.6CS3Ch. 3 - Prob. 3.7CS3Ch. 3 - Prob. 3.8CS3Ch. 3 - Prob. 3.9CS3Ch. 3 - Prob. 3.10CS3Ch. 3 - Prob. 3.11CS3Ch. 3 - Prob. 3.12CS3Ch. 3 - Prob. 3.13MMLCh. 3 - Prob. 3.14MMLCh. 3 - Prob. 3.15MML
Knowledge Booster
Similar questions
- Which of the following interpretations has the most significant ethical repercussions? This shady maneuver is unquestionably immoral, and it makes no difference who is involved or what the circumstances are. It is best to steer clear of it. Explain.arrow_forwardShow how the right to free speech and the ownership of a trademark may sometimes work directly against one another and be in conflict with one another. How can these statements, which at first glance seem to be in direct opposition to one another, be reconciled with one another?arrow_forwardA security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific exampl A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. e of what you mean.arrow_forward
- oung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasonsarrow_forwardPlease restrict your responses to a maximum of three to four. What does it mean to approach science, technology, and development from a human rights perspective?arrow_forwardCan you please help me find an applicable law/s for these three commandments, the specific violation identified, and a Remark (including specific penalties). Below is an example. The law/s should be from the Philippines Here is the table I should fill out: Computer Ethics commandment Applicable Laws Specific Violation Identified Remark 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).arrow_forward
- There is quite a number of approaches to the study of ethical issues. With clear illustrations, compare two of such approaches.arrow_forwardQuestion 4 a) A class assignment has been given to all students learning NT182. The lecturer decides to award zero to students who have copied each other's solution. Discuss why you consider the lecturer's decision ethical or unethical. b) Discuss the harmful effects computers and electronic devices on users and suggest possible solutions.arrow_forwardConsider three ethical principles: What's their basis? Suggest an alternative reason. Why is your argument stronger? Your logic must be justified.arrow_forward
- Hello, I want you to answer this question. In your own words, make the 11th commandment by summarizing the existing 10 commandments of computer ethics.arrow_forwardAs time passes, the use of the internet as a forum for expressing one's right to free speech becomes increasingly prevalent. Numerous individuals and organizations use Facebook and Twitter to propagate hate speech. Given the medium, should there be no constraints on free speech on the Internet? Should hate speech on social media sites be restricted?arrow_forwardWhat does the term "ethics" mean to you? Are there any situations when claim-rights and freedoms (negative and positive rights) directly conflict with one another?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning