Using MIS (10th Edition)
10th Edition
ISBN: 9780134606996
Author: David M. Kroenke, Randall J. Boyle
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4.6, Problem 4EGDQ
a)
Explanation of Solution
“Yes”, the decision of removing the apps when it considers inappropriate by Google is ethical.
Reason:
Categorical imperative is that in all situations the complete requirements must be followed and it should be acceptable as an end in it...
b)
Explanation of Solution
“Yes”, the decision of restrict permissions for some apps by Google is ethical.
Reason:
Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility.
- According to utilitarian perspective, Google has rights to restrict the permissions o...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Q.1 What is the difference between industrial spying and the gathering of competitive intelligence? Is the use of competitive intelligence ethical or unethical? Why?
Q2. A successful distributed denial-of-service attack requires the downloading of software that turns unprotected computers into zombies under the control of the malicious hacker. Should the owners of the zombie computers be fined or otherwise punished as a means of encouraging people to better safeguard their computers? Why or why not?
Martin had registered two domain names that contain words identical to Dream Works, and he claimed that the said websites are used as educational websites that provide English language training. Still, later he was selling the rights to Dream Works. Evidence presented in court showed that Martin never used the disputed domain names. The court then concluded that it was a cybersquatting case. Which of the following instances were committed that made the act punishable?
A. Purpose is to profit, mislead, destroy reputation, and deprive others from registering the same.
B. The acquisition of a domain name over the internet in bad faith.
C.Identical or in any way similar with the name of a person other than the registrant
D.Acquired without right or with intellectual property interests in it.
Question 14 papa .in United States v. Seidlitz, What exactly is the property that was taken here? What if the data obtained is just the phonebook: Is that property? Should it be a crime to hack only if the data obtained has economic value?
Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line
Chapter 4 Solutions
Using MIS (10th Edition)
Ch. 4.4 - Prob. 1NFCQCh. 4.4 - Prob. 2NFCQCh. 4.4 - Why might doctors and nutritionists be interested...Ch. 4.4 - Prob. 4NFCQCh. 4.4 - Prob. 5NFCQCh. 4.4 - Prob. 6NFCQCh. 4.6 - Prob. 1EGDQCh. 4.6 - Prob. 3EGDQCh. 4.6 - Prob. 4EGDQCh. 4.8 - Prob. 1SGDQ
Ch. 4.8 - Prob. 2SGDQCh. 4.8 - Prob. 3SGDQCh. 4.8 - Prob. 4SGDQCh. 4.8 - Prob. 4.1ARQCh. 4.8 - Prob. 4.2ARQCh. 4.8 - Prob. 4.3ARQCh. 4.8 - Prob. 4.4ARQCh. 4.8 - Prob. 4.5ARQCh. 4.8 - Prob. 4.6ARQCh. 4.8 - Prob. 4.7ARQCh. 4.8 - Prob. 4.8ARQCh. 4 - Prob. 4.1UYKCh. 4 - Prob. 4.2UYKCh. 4 - Prob. 4.3UYKCh. 4 - Prob. 4.4UYKCh. 4 - Prob. 4.5UYKCh. 4 - Prob. 4.6UYKCh. 4 - Prob. 4.7CE4Ch. 4 - Prob. 4.8CE4Ch. 4 - Prob. 4.9CE4Ch. 4 - Prob. 4.1CE4Ch. 4 - Prob. 4.11CE4Ch. 4 - Prob. 4.12CS4Ch. 4 - Prob. 4.13CS4Ch. 4 - Prob. 4.14CS4Ch. 4 - Prob. 4.15CS4Ch. 4 - Prob. 4.16CS4Ch. 4 - Prob. 4.17MMLCh. 4 - Prob. 4.18MML
Knowledge Booster
Similar questions
- Question 1 Which of the following correctly describes the difference between privacy and security? Privacy is about the individual's control over sensitive information pertaining to the individual; security is about the methods used to provide control over information. Privacy is about controlling access to personal information; security is about controlling access to company information. None of the listed choices are correct. Privacy and security refer to the sets of controls used to protect information. Question 2 Extended service agreements which run for 3 more years require that Sifers-Grayson provide software maintenance and patches for SCADA systems sold more than fifteen years ago. The engineering workstations used to provide this support take up 500 sq ft of space in the R&D lab and, due to their reliance on Windows XP, present security vulnerabilities which need to…arrow_forwardThe use of the Internet has evolved to the point where it is now an indispensable instrument for exercising one's right to free speech. It's standard practise for people to use hate speech to spread on social media platforms like Facebook and Twitter. Should there be no restrictions placed on the right to free speech for those who use the internet? The operators of social media platforms need to carefully assess the extent to which they may cut down on the number of negative comments they publish.arrow_forwardlegal aspects of cybersecurity The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.arrow_forward
- legal aspects of cybersecurity Justice Alito’s opinion in US v. Jones is referenced extensively in the Carpenterdecision. Which of the following is not one of the arguments offered by Justice Alito inthe Jones decision?A. GPS devices are intended for long-term tracking.B. Relying solely on physical trespasses leads to incongruous results.C. GPS technology is costly, and has limited availability in the consumer market.D. Reliance solely on the law of trespass presents more problems in cases involvingsurveillance carried out by electronic means.arrow_forwardQuestion 15 kk .If public schools were to implement programs to help teach self-control among children at a young age and then continue providing education on how to use technology responsibly, do you think we would see a reduction in cyber crime? Why or why not? Use specific examples from the theory to support your response. Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this linearrow_forwardlegal aspects of cybersecurity Per the Supreme Court’s holding in Katz v. United States, which two factors aremost indicative of whether a reasonable expectation of privacy exists?A. Economic costs and established precedent.B. Society’s preparation to accept such expectation, and current technologicaladvancements.C. Society’s preparation to accept such expectation, and steps taken by accused tosafeguard expectation.D. Steps taken by accused to safeguard expectation, and current technologicaladvancements.arrow_forward
- This question relates to the ethical issues associated with information technology. Consider the ten commandments of computer ethics. Select any five ofthese commandments. Then, find one published example that describes a violation of each of theselected commandments.Note: The violation identified should be described.arrow_forwardAnalyze the following scenario: An employee using company resources sends email that is later retrieved when the employee sues the company. Is there a reasonable expectation of privacy? Is it different if the computer used was purchased by the employee but the email was sent during work hours? What additional facts or changes in your assumptions would alter your analysis? Ethically, what are the arguments, pro and con, for an employer monitoring electronic communication?arrow_forwardEthical Decision Making Instead of Charlie being named CISO, suppose instead that Fred hired his son-in-law, an unemployed accountant, to fill the role. Assuming the person had no prior experience or preparation for a job in information security, did Fred make an ethical choice? Explain your answer. Suppose that SLS has implemented the policy prohibiting use of personal USB drives at work. Also, suppose that Davey Martinez brought in the USB drive he had used to store last month’s accounting worksheet. When he plugged in the drive, the worm outbreak started again and infected two servers. It’s obvious that Davey violated policy, but did he commit ethical violations as well?arrow_forward
- This question relates to the ethical issues associated with information technology. Evidence ofresearch is needed.Consider the ten commandments of computer ethics. Select any five ofthese commandments. Then, find one published example that describes a violation of each of theselected commandments.Note: The violation identified should be described.arrow_forwardQ.5.2 Argue for and against the establishment of legislations such as the Protection ofPersonal Information.Q.5.3 Your classmates have been distributing messages via WhatsApp thatdiscriminate against certain people. Referring to the draft cybercrimes andcybersecurity bill, what would be the consequences (if any) for the above act?arrow_forwardA malevolent hacker must download malware that turns unprotected machines into zombies in order to launch a successful distributed denial-of-service assault. Should those who allow their computers to become "zombies" be penalized in order to increase online safety? So, why?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning