PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
12th Edition
ISBN: 9781337074674
Author: STAIR
Publisher: CENGAGE C
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 6.4, Problem 2CTQ
Program Plan Intro
Safaricom:
- Safaricom is a top telecommunications supplier in Kenya and one of the most commercial companies in the Central and East African region.
- It offers mobile money transfer, cloud computing, fiber optic services, ecommerce, mobile telephony, data, customer electronics and music streaming.
- It is most well-known as a mobile banking SMS-based service.
Step taken by Safaricom:
The steps taken by Safaricom to prevent hate speech during the 2013 elections is the company released guidelines to its clients that transferred huge SMS from candidates and political parties, examined the SMS content and held the right to reject to transfer messages with subject that attacked members of a special party.
Safaricom act ethically:
- The guidelines assigned that senders, political party representative had to describe themselves and give registration documents or ID numbers.
- The message sent in the two official languages one is English or Kenya and another is Swahili by the company.
- The SMSs could not use abusive language and motivate people to attack individuals, make violence.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Would eliminating anonymity on the Internet make it -and us- more secure? Yes or no? Provide details in support of your answer.
Would you find it morally acceptable to use cyber attacks to shut down a Web server that distributes illegal content, child pornography or similar?
Is it fair to hold Facebook liable for privacy concerns that arise as a result of its users' carelessness or ignorance? explain?
Is the practise of email encryption considered ethically acceptable by professionals in the field of information technology?
Chapter 6 Solutions
PRINCIPLES OF INFO.SYS.(LL)>CUSTOM PKG<
Ch. 6.4 - Prob. 1DQCh. 6.4 - Prob. 2DQCh. 6.4 - Prob. 1CTQCh. 6.4 - Prob. 2CTQCh. 6.5 - Prob. 1DQCh. 6.5 - Prob. 2DQCh. 6.5 - Prob. 1CTQCh. 6.5 - Prob. 2CTQCh. 6 - Prob. 1SATCh. 6 - Prob. 2SAT
Ch. 6 - Prob. 3SATCh. 6 - Prob. 4SATCh. 6 - Prob. 5SATCh. 6 - Prob. 6SATCh. 6 - Prob. 7SATCh. 6 - Prob. 8SATCh. 6 - Prob. 9SATCh. 6 - Prob. 10SATCh. 6 - Prob. 11SATCh. 6 - Prob. 12SATCh. 6 - Prob. 13SATCh. 6 - Prob. 1RQCh. 6 - Prob. 2RQCh. 6 - Prob. 3RQCh. 6 - Prob. 4RQCh. 6 - Prob. 5RQCh. 6 - Prob. 6RQCh. 6 - Prob. 7RQCh. 6 - Prob. 8RQCh. 6 - Prob. 9RQCh. 6 - Prob. 10RQCh. 6 - Prob. 11RQCh. 6 - Prob. 12RQCh. 6 - Prob. 13RQCh. 6 - Prob. 14RQCh. 6 - Prob. 15RQCh. 6 - Prob. 16RQCh. 6 - Prob. 1DQCh. 6 - Prob. 2DQCh. 6 - Prob. 3DQCh. 6 - Prob. 4DQCh. 6 - Prob. 5DQCh. 6 - Prob. 6DQCh. 6 - Prob. 7DQCh. 6 - Prob. 8DQCh. 6 - Prob. 9DQCh. 6 - Prob. 10DQCh. 6 - Prob. 11DQCh. 6 - Prob. 12DQCh. 6 - Prob. 1PSECh. 6 - Prob. 2PSECh. 6 - Prob. 1TACh. 6 - Prob. 2TACh. 6 - Prob. 1DQ1Ch. 6 - Prob. 2DQ1Ch. 6 - Prob. 1CTQ1Ch. 6 - Prob. 2CTQ1Ch. 6 - Prob. 1DQ2Ch. 6 - Prob. 2DQ2Ch. 6 - Prob. 1CTQ2Ch. 6 - Prob. 2CTQ2Ch. 6 - Prob. 1DQ3Ch. 6 - Prob. 2DQ3Ch. 6 - Prob. 1CTQ3Ch. 6 - Prob. 2CTQ3
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Today's society places a high value on privacy, yet it is also divided on the issue. Do you think there is anything further that can be done to preserve internet privacy? As an example, do you believe that laws are sufficient?arrow_forwardWhat are your thoughts on the question of whether or not social media platforms like Facebook ought to provide law enforcement access to the accounts of its users so that investigations may be conducted? What exactly is the purpose of posing a question of this nature?arrow_forwardDo the present safeguards make it safe for children under the age of 16 to access the internet? Does this sound right? If it doesn't happen, what options do governments have?arrow_forward
- How did violations/abuses of the use of the internet & computers impact the right to privacy? Was the government (local and abroad) able to solve these violations?arrow_forwardPrivacy. Does it even exist any longer? And what aobut the laws that are meant to address it - such as with emails?arrow_forwardIf a child is less than 16 years old, are they protected from the dangers posed by the internet by the safeguards that are now in place? In the event that this is not the case, what further actions may the governments take?arrow_forward
- Is it feasible to deliver a speech on the subject of internet and social media addiction?arrow_forwardWhat impact did internet and computer misuse have on the right to privacy? What steps were taken by the authorities, both at home and abroad, to put a stop to these abuses?arrow_forwardDo you believe that the government and law enforcement agencies should be permitted to see user profiles on social media websites such as Facebook in order to investigate potential instances of unlawful behaviour? What, precisely, is taking place at this location?arrow_forward
- Explore the concept of Internet censorship and the methods used by governments and organizations to control information flow. What are the implications for freedom of expression?arrow_forwardWhat influence did violations/abuses of the internet and computers have on the right to privacy? Was the government (both domestic and foreign) able to put an end to these violations?arrow_forwardExisting protections against harm to children under 16 years old while using the internet: are they adequate? What further measures may governments possibly think of implementing if this is not the case?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning