Experiencing MIS
8th Edition
ISBN: 9780134792736
Author: KROENKE
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 4, Problem 2EGDQ
a.
Explanation of Solution
Explanation:
“Yes”, Google has legal obligations to find out the apps which are harvesting data inappropriately.
- A permission to find out the apps which are illegally harvesting personal information of users is required by the Google from higher authorities and from the government...
b.
Explanation of Solution
Explanation:
“No”, Google does not have ethical obligations to find out the apps which are harvesting data inappropriately...
c.
Explanation of Solution
Explanation:
“No”, Google does not provide free apps in exchange for user data.
- Google has its own rules and regulations which are supported by collective judges and law...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Describe an instance in which a user's full denial of service (i.e., the user receives no answer from the computer) is a significant issue for that user. Describe another scenario in which a 10% denial of service to a customer (i.e., the user's calculation advances at a 10% slower pace than usual) is a significant issue for that user. Is it possible that unauthorized entry to a computer device would result in a 10% denial of service to legal users?
How can you do it?
1. What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk?
2. Consider the information stored in your personal computer. Do you currently have information stored in your computer that is critical to your personal life? If that information became compromised or lost, what effect would it have on you?
3. There are a number of professional organizations for computer security. Search for two organizations and share the websites and descriptions of those organizations. Share that information here:4. Choose two of the US federal agencies listed in Chapter 3 that deal with computer/cybercrime. List at least three differences, in terms of reach or responsibility, between the two organizations.
The widespread availability of mobile phones now provides enormous convenience, but may its abuse lead to the loss of this benefit? Mobile phones are banned in many classrooms due to the distraction of constant texting and the use of the phone by dishonest students to cheat on exams; similarly, camera phones are now banned in many fitness centers, park restrooms, and other similar facilities because some people have used them inappropriately to take compromising photos. What do you think about these responses to cell phone abuse? Is universally prohibiting cell phone use the only solution, or are there alternative methods to assure responsible usage? Should individuals who exploit technology in a dishonest or immoral way face harsher penalties?
.
Chapter 4 Solutions
Experiencing MIS
Ch. 4.2 - Prob. 1SWCh. 4.2 - Prob. 2SWCh. 4.2 - Prob. 3SWCh. 4.2 - Prob. 4SWCh. 4.2 - Prob. 5SWCh. 4.2 - Prob. 6SWCh. 4 - Prob. 1EGDQCh. 4 - Prob. 2EGDQCh. 4 - Prob. 3EGDQCh. 4 - Prob. 4EGDQ
Ch. 4 - Prob. 1ARQCh. 4 - Prob. 2ARQCh. 4 - Prob. 3ARQCh. 4 - Prob. 4ARQCh. 4 - Prob. 1UYKCh. 4 - Prob. 2UYKCh. 4 - Prob. 3UYKCh. 4 - Prob. 4CECh. 4 - Prob. 5CECh. 4 - Prob. 6CECh. 4 - Prob. 7CECh. 4 - Prob. 8CECh. 4 - Prob. 9CSCh. 4 - Prob. 10CSCh. 4 - Prob. 11CSCh. 4 - Prob. 12CSCh. 4 - Prob. 13CSCh. 4 - Prob. 14MLMCh. 4 - Prob. 15MLM
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- The use of the Internet has evolved to the point where it is now an indispensable instrument for exercising one's right to free speech. It's standard practise for people to use hate speech to spread on social media platforms like Facebook and Twitter. Should there be no restrictions placed on the right to free speech for those who use the internet? The operators of social media platforms need to carefully assess the extent to which they may cut down on the number of negative comments they publish.arrow_forwardDo you agree that it's reasonable to provide a username and email address in exchange for free or almost free software? Is there a way to make sure they're accountable for the data they acquire and how they utilise it? Be prepared to defend your stance at any time. Your claim must be backed up with proof.arrow_forwardFile-sharing software threatens the music industry in part because artists will not be fully compensated for their recordings of songs. Suppose that the government decides that file-sharing software products are legal anyway.a. The almost immediate result will be that artists start earning very little money for their recordings, but they continue to earn money for live performances. How will income change for the music industry? How does your answer relate to the superstar phe nomenon?b. Although one would expect lower prices to benefit the music-listening public if the government decides that file-sharing software products are legal, but in what way(s) could the music-listening public also be hurt from the policy?arrow_forward
- 1. Autopsy found two images that had file extensions that were not associated with images. How didAutopsy know they were images?2. Why would someone put data in unallocated space and what type of forensic imaging would notfind this data?3. How would you go about recovering the data in the unallocated space?arrow_forwardAnalyze the following scenario: An employee using company resources sends email that is later retrieved when the employee sues the company. Is there a reasonable expectation of privacy? Is it different if the computer used was purchased by the employee but the email was sent during work hours? What additional facts or changes in your assumptions would alter your analysis? Ethically, what are the arguments, pro and con, for an employer monitoring electronic communication?arrow_forwardWeek 3: Discussion Standards for Evidence Collection & Volatile Data Collection 22 unread replies.22 replies. Submit your initial post for one of these two options. Option 1- Evidence Collection Standards Discuss the similarities and differences in standards for collecting evidence in private, civil, and criminal investigations. Describe the likely places where the different types of investigations will occur. Describe who will be involved in each type of investigation. Option 2 Volatile Data Describe volatile data, including situations when a forensic examiner would need to collect it. Explain the possible forensic relevance of volatile data. Explain differences in recommendations for first responders and forensic specialists for collecting volatile data. What equipment and resources would a forensic specialist need to collect volatile data?arrow_forward
- Question 1 Which of the following correctly describes the difference between privacy and security? Privacy is about the individual's control over sensitive information pertaining to the individual; security is about the methods used to provide control over information. Privacy is about controlling access to personal information; security is about controlling access to company information. None of the listed choices are correct. Privacy and security refer to the sets of controls used to protect information. Question 2 Extended service agreements which run for 3 more years require that Sifers-Grayson provide software maintenance and patches for SCADA systems sold more than fifteen years ago. The engineering workstations used to provide this support take up 500 sq ft of space in the R&D lab and, due to their reliance on Windows XP, present security vulnerabilities which need to…arrow_forwardlegal aspects of cybersecurity In Riley v. California, Chief Justice Roberts identifies how digital devices areentitled to warrant protection, because of the storage capacity of such devices. Which ofthe following is not one of the storage-capacity rationales that Chief Justice Robertsoffers for warrant protection of mobile devices?A. Mobile devices collect in one place many distinct types of information.B. Mobile devices permit one type of information to link to several others.C. Mobile devices may include data dating to prior to purchase of the phone.D. Mobile devices take long periods of time before all data is deleted.arrow_forwardIn recent years, the Internet has swiftly developed into a crucial instrument that may be used by individuals to exercise their right to freedom of speech as guaranteed by the First Amendment. Some people are spreading hate speech via social media platforms like Facebook and Twitter. This is an unfortunate reality. Should there be no limits placed on people's ability to express themselves freely on the internet? What measures need to be taken by social media platforms in order to stop the propagation of anti-Semitic content?arrow_forward
- Identify and describe in a sentence or two a control for each of the following cells of the McCumber Cube. Your description should justify how the control fits in that cell. (Availability,Storage,Technology) (Integrity,Transmission,Technology) (Confidentiality,Storage,Policy & Practice) (Authentication,Transmission,Human Factors) (Confidentiality,Processing,Technology)arrow_forwardWhat does the First Amendment of the United States Constitution provide for free "expression" on the internet, according to the courts? Is it legal for the government to search websites without a warrant in order to foil terrorist plots? What does the Fourth Amendment's search and seizure clause mean? What do seizure provisions provide for in terms of taking down obnoxious websites? How about this: sites that are hosted in another country?arrow_forwardWhich of the following activities do you think should be fair use? Give reasons using copyright law and/or court cases. (If you think the ethically right decision differs from the result that follows from applying fair use guidelines, explain how and why.) a) Making a copy of a friend's spreadsheet software to try out for two weeks and then either deleting it or buying your own copy. b) Making a copy of a computer game, playing it for two weeks, and then deleting it.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning