BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168

Solutions

Chapter
Section
BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168
Chapter 6.4, Problem 1DQ
Textbook Problem
42 views

What steps did Safaricom take to prevent hate speech during the 2013 elections? Did Safaricom act ethically? Why or why not?

Program Plan Intro

Safaricom:

  • Safaricom is a top telecommunications supplier in Kenya and one of the most commercial companies in the Central and East African region.
  • It offers mobile money transfer, cloud computing, fiber optic services, ecommerce, mobile telephony, data, customer electronics and music streaming.
  • It is most well-known as a mobile banking SMS-based service.

Explanation of Solution

Step taken by Safaricom:

  • The steps taken by Safaricom to prevent hate speech during the 2013 elections are the company released guidelines to its clients that transferred huge SMS from candidates and political parties.
  • It examined the SMS content and held the right to reject to transfer messages with subject that attacked members of a special party.

Safaricom act ethically:

Yes”, the Safaricom acted ethically...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 6 Solutions

Principles of Information Systems (MindTap Course List)
Show all chapter solutions
add
Ch. 6 - A _________ defines a set of rules, algorithms,...Ch. 6 - A _______ permits data transmission in both...Ch. 6 - ______ involves the transmission of extremely...Ch. 6 - A(n) ______ network uses multiple access points to...Ch. 6 - The Ticketmaster reservation service is an example...Ch. 6 - A ______ is a network device that serves as an...Ch. 6 - A(n) ______ private network uses a public network...Ch. 6 - ______ enables a manager on a networked personal...Ch. 6 - ________ is the process of converting an original...Ch. 6 - Reverse 911 is a communications solution that...Ch. 6 - ______ is a way to communicate data from one...Ch. 6 - Define the term telecommunications medium. Name...Ch. 6 - Define the term network topology, and identify...Ch. 6 - What is a telecommunications protocol? Give the...Ch. 6 - Identify the names of the three primary frequency...Ch. 6 - Briefly describe the differences between a...Ch. 6 - Identify two organizations that lead in the...Ch. 6 - Identify and briefly describe three types of...Ch. 6 - What is Bluetooth? How is it used?Ch. 6 - What is a wireless mesh network? What is one of...Ch. 6 - Describe how a Wi-Fi network works.Ch. 6 - What are some of the advantages of...Ch. 6 - What is the difference between a network operating...Ch. 6 - Distinguish between a router and a switch.Ch. 6 - Identify two approaches to securing the...Ch. 6 - What is a reverse 911 service? Give two examples...Ch. 6 - What is electronic data interchange? List three...Ch. 6 - What are the risks of transmitting data over an...Ch. 6 - Briefly discuss the differences between...Ch. 6 - Distinguish between client/server and file server...Ch. 6 - What is the issue associated with transborder data...Ch. 6 - Distinguish between centralized and distributed...Ch. 6 - Briefly describe how a cellular phone service...Ch. 6 - Briefly explain how the GPS system determines the...Ch. 6 - Briefly discuss some of the changes that are...Ch. 6 - Imagine that you are responsible for signage on...Ch. 6 - Identify some of the features and capabilities...Ch. 6 - Is telecommuting aimed solely at enabling...Ch. 6 - Discuss the role of the PBX and identify some of...Ch. 6 - You have been hired as a telecommunications...Ch. 6 - As a member of the information systems...Ch. 6 - Form a team to interview a manager employed in a...Ch. 6 - Form a team to identify the public locations (such...Ch. 6 - How does the destruction of technology during...Ch. 6 - How does NetHope partner with other organizations...Ch. 6 - Which of the telecommunications and networking...Ch. 6 - Major natural disasters, while not as rare as one...Ch. 6 - Where does Africa stand in relation to Europe and...Ch. 6 - What technological barriers do companies face when...Ch. 6 - Do you think that innovators like SkyVision or...Ch. 6 - What role do you think governments and...Ch. 6 - What telecommunications equipment is needed to...Ch. 6 - Why is it necessary to lease a line from a...Ch. 6 - What types of services will be provided over...Ch. 6 - What considerations should Jon and his team take...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What was the earliest reason for the use of cryptography?

Principles of Information Security (MindTap Course List)

Should the IT director report to the company president, or somewhere else? Does it matter?

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Compute the nominal flexural strength of the composite beam in Problem 9.1-2. Use Fy=50 ksi.

Steel Design (Activate Learning with these NEW titles from Engineering!)

What are the two basic types of keys?

Precision Machining Technology (MindTap Course List)

Identify at least ten products around your home that make use of plastics.

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

List file and disk management tools, and describe the function of each.

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)