Principles of Information Systems (MindTap Course List)
12th Edition
ISBN: 9781285867168
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6.4, Problem 1CTQ
Program Plan Intro
Safaricom:
- Safaricom is a top telecommunications supplier in Kenya and one of the most commercial companies in the Central and East African region.
- It offers mobile money transfer, cloud computing, fiber optic services, ecommerce, mobile telephony, data, customer electronics and music streaming.
- It is most well-known as a mobile banking SMS-based service.
Steps taken by Safaricom:
- The steps taken by Safaricom to prevent hate speech during the 2013 elections are that the company released guidelines to its clients that transferred huge SMS from candidates and political parties.
- It examined the SMS content and held the right to reject to transfer messages with subject that attacked members of a special party.
Safaricom act ethically:
- The guidelines assigned that senders, political party representative had to describe themselves and give registration documents or ID numbers.
- The message sent in the two official languages one is English or Kenya and another is Swahili by the company.
- The SMSs could not use abusive language and motivate people to attack individuals, make violence.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Do you believe that authorities should have access to Facebook and other social media accounts in order to probe any criminal activity? Just what is happening over here, anyway?
Should the government and law enforcement be able to access Facebook accounts in order to probe criminal activity? So, what is happening over here, exactly?
When looking into possible criminal activity, do you believe the government and law enforcement organizations should have access to user accounts on social networking sites like Facebook? Where did all this chaos come from over here?
Chapter 6 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 6.4 - Prob. 1DQCh. 6.4 - Prob. 2DQCh. 6.4 - Prob. 1CTQCh. 6.4 - Prob. 2CTQCh. 6.5 - Prob. 1DQCh. 6.5 - Prob. 2DQCh. 6.5 - Prob. 1CTQCh. 6.5 - Prob. 2CTQCh. 6 - Prob. 1SATCh. 6 - Prob. 2SAT
Ch. 6 - Prob. 3SATCh. 6 - Prob. 4SATCh. 6 - Prob. 5SATCh. 6 - Prob. 6SATCh. 6 - Prob. 7SATCh. 6 - Prob. 8SATCh. 6 - Prob. 9SATCh. 6 - Prob. 10SATCh. 6 - Prob. 11SATCh. 6 - Prob. 12SATCh. 6 - Prob. 13SATCh. 6 - Prob. 1RQCh. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Prob. 4RQCh. 6 - Prob. 5RQCh. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - Prob. 9RQCh. 6 - Prob. 10RQCh. 6 - Prob. 11RQCh. 6 - Prob. 12RQCh. 6 - Prob. 13RQCh. 6 - Prob. 14RQCh. 6 - Prob. 15RQCh. 6 - Prob. 16RQCh. 6 - Prob. 1DQCh. 6 - Prob. 2DQCh. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Prob. 5DQCh. 6 - Prob. 6DQCh. 6 - Prob. 7DQCh. 6 - Prob. 8DQCh. 6 - Prob. 9DQCh. 6 - Prob. 10DQCh. 6 - Prob. 11DQCh. 6 - Prob. 12DQCh. 6 - Prob. 1PSECh. 6 - Prob. 2PSECh. 6 - Prob. 1TACh. 6 - Prob. 2TACh. 6 - Prob. 1DQ1Ch. 6 - Prob. 2DQ1Ch. 6 - Prob. 1CTQ1Ch. 6 - Prob. 2CTQ1Ch. 6 - Prob. 1DQ2Ch. 6 - Prob. 2DQ2Ch. 6 - Prob. 1CTQ2Ch. 6 - Prob. 2CTQ2Ch. 6 - Prob. 1DQ3Ch. 6 - Prob. 2DQ3Ch. 6 - Prob. 1CTQ3Ch. 6 - Prob. 2CTQ3
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- What do you think eGovernment is and how does it work?arrow_forwardDo the present safeguards make the internet safe for children under the age of 16? How far can governments go from here, if at all?arrow_forwardDo you believe that the government and law enforcement agencies should be permitted to see user profiles on social media websites such as Facebook in order to investigate potential instances of unlawful behaviour? What, precisely, is taking place at this location?arrow_forward
- Privacy. Does it even exist any longer? And what aobut the laws that are meant to address it - such as with emails?arrow_forwardAre children under 16 protected from internet harm with the current precautions in place? What further measures might be taken by the government if this were not the case?arrow_forwardDraw your knowledge on Normative ethics, discuss whether or not students with rasta hair can be admitted into our high schools.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning