BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168

Solutions

Chapter
Section
BuyFindarrow_forward

Principles of Information Systems ...

12th Edition
Ralph Stair + 1 other
Publisher: Cengage Learning
ISBN: 9781285867168
Chapter 6.4, Problem 2CTQ
Textbook Problem
1 views

Should Safaricom be allowed to intercept and vet peer-to-peer messages? Or should the right to privacy trump the need to stop hate crime?

Program Plan Intro

Safaricom:

  • Safaricom is a top telecommunications supplier in Kenya and one of the most commercial companies in the Central and East African region.
  • It offers mobile money transfer, cloud computing, fiber optic services, ecommerce, mobile telephony, data, customer electronics and music streaming.
  • It is most well-known as a mobile banking SMS-based service.

Step taken by Safaricom:

The steps taken by Safaricom to prevent hate speech during the 2013 elections is the company released guidelines to its clients that transferred huge SMS from candidates and political parties, examined the SMS content and held the right to reject to transfer messages with subject that attacked members of a special party.

Safaricom act ethically:

  • The guidelines assigned that senders, political party representative had to describe themselves and give registration documents or ID numbers.
  • The message sent in the two official languages one is English or Kenya and another is Swahili by the company.
  • The SMSs could not use abusive language and motivate people to attack individuals, make violence.

Explanation of Solution

No”, Safaricom should not be allowed to intercept and vet peer-to-peer messages because,

  • As per the American constitution, the right to privacy is one of the fundamental rights where the person is given privacy in terms of his informal communication to his peers...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 6 Solutions

Principles of Information Systems (MindTap Course List)
Show all chapter solutions
add
Ch. 6 - A _________ defines a set of rules, algorithms,...Ch. 6 - A _______ permits data transmission in both...Ch. 6 - ______ involves the transmission of extremely...Ch. 6 - A(n) ______ network uses multiple access points to...Ch. 6 - The Ticketmaster reservation service is an example...Ch. 6 - A ______ is a network device that serves as an...Ch. 6 - A(n) ______ private network uses a public network...Ch. 6 - ______ enables a manager on a networked personal...Ch. 6 - ________ is the process of converting an original...Ch. 6 - Reverse 911 is a communications solution that...Ch. 6 - ______ is a way to communicate data from one...Ch. 6 - Define the term telecommunications medium. Name...Ch. 6 - Define the term network topology, and identify...Ch. 6 - What is a telecommunications protocol? Give the...Ch. 6 - Identify the names of the three primary frequency...Ch. 6 - Briefly describe the differences between a...Ch. 6 - Identify two organizations that lead in the...Ch. 6 - Identify and briefly describe three types of...Ch. 6 - What is Bluetooth? How is it used?Ch. 6 - What is a wireless mesh network? What is one of...Ch. 6 - Describe how a Wi-Fi network works.Ch. 6 - What are some of the advantages of...Ch. 6 - What is the difference between a network operating...Ch. 6 - Distinguish between a router and a switch.Ch. 6 - Identify two approaches to securing the...Ch. 6 - What is a reverse 911 service? Give two examples...Ch. 6 - What is electronic data interchange? List three...Ch. 6 - What are the risks of transmitting data over an...Ch. 6 - Briefly discuss the differences between...Ch. 6 - Distinguish between client/server and file server...Ch. 6 - What is the issue associated with transborder data...Ch. 6 - Distinguish between centralized and distributed...Ch. 6 - Briefly describe how a cellular phone service...Ch. 6 - Briefly explain how the GPS system determines the...Ch. 6 - Briefly discuss some of the changes that are...Ch. 6 - Imagine that you are responsible for signage on...Ch. 6 - Identify some of the features and capabilities...Ch. 6 - Is telecommuting aimed solely at enabling...Ch. 6 - Discuss the role of the PBX and identify some of...Ch. 6 - You have been hired as a telecommunications...Ch. 6 - As a member of the information systems...Ch. 6 - Form a team to interview a manager employed in a...Ch. 6 - Form a team to identify the public locations (such...Ch. 6 - How does the destruction of technology during...Ch. 6 - How does NetHope partner with other organizations...Ch. 6 - Which of the telecommunications and networking...Ch. 6 - Major natural disasters, while not as rare as one...Ch. 6 - Where does Africa stand in relation to Europe and...Ch. 6 - What technological barriers do companies face when...Ch. 6 - Do you think that innovators like SkyVision or...Ch. 6 - What role do you think governments and...Ch. 6 - What telecommunications equipment is needed to...Ch. 6 - Why is it necessary to lease a line from a...Ch. 6 - What types of services will be provided over...Ch. 6 - What considerations should Jon and his team take...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is normalization?

Database Systems: Design, Implementation, & Management

What is a genetic algorithm? Give an example of the use of a genetic algorithm.

Principles of Information Systems (MindTap Course List)

Describe what happens when receivables are factored.

Cornerstones of Financial Accounting

What e some of the benefits and shortcomings of using CASE tools for process modeling activities?

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

What is a future worth of a present amount?

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

The most common variation of the above chuck has how many jaws?

Precision Machining Technology (MindTap Course List)

Security The Social Media exercise in this section discusses online dating websites. According to some of these...

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

Why are some copper alloy cutting tips chrome-plated?

Welding: Principles and Applications (MindTap Course List)