Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter B, Problem B7.2MBD
Program Plan Intro
Information Ethics:
- Dealing with information is bounded with ethical principles, which should be followed.
- An information privacy policy should be developed for organizations intending to protect its information.
- Fair information practices denote a set of standards that governs collection and use of personal data and addressing issues for accuracy and privacy.
- It deals with creation, dissemination, organization and usage of information.
- It provides moral framework for information privacy.
- The subjects such as protection of copyright, intellectual freedom, responsibility, privacy as well as security are an important concern.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
More and more people are using computers, networks, and the internet, which raises a number of ethical and moral concerns. Can our issues be resolved, or are they unsolvable?
A variety of ethical problems have been brought to light as a result of the widespread use of digital technologies such as computers, information networks, and the internet; the question is, how should these concerns be addressed?
The ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but will misuse of new improvements to this technology result in the loss of that convenience? For instance, camera phones are now banned in many fitness centres, park restrooms, and other similar facilities because some people have used them inappropriately to take compromising photos, and mobile phones are banned in many classrooms because of the disruption of constant text messaging and the use of the phone by dishonest students to cheat on exams. Do you think these reactions to mobile phone misuse are justified? Is there another way to ensure the appropriate use of mobile phones without banning their use for all individuals? Should there be more stringent consequences for those who use technology for illegal or unethical purposes?
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Why do people seem to be so dependent on technological devices? Is this anything that companies should be concerned about when it comes to the ethics of technology? A good illustration of this is the addiction that many people have to their mobile devices and social media accounts. Isn't it also general knowledge that the fundamental cause of these issues is the development of new technologies (such as global warming)?arrow_forwardMore and more people are using computers, networks, and the internet, which raises a number of moral and ethical concerns. Is there a way out of this predicament?arrow_forwardThe study of computer ethics covers a wide range of subjects, some of which include government, crime, privacy, social interactions, and even security. These are only a few of the subjects that are investigated. How important do you think it is for chief information officers to make ethics in computer use a high priority so that sensitive customer information may be kept secure?arrow_forward
- Many people believe that the digital world may be roughly divided into two groups: those who have access to computers and the Internet, and those who do not. Some argue that this has serious moral repercussions, and that the disparity must be addressed. Those on the bottom may feel marginalized and deprived of opportunities because of it. Do you believe that everyone, whatever where they live, their financial situation, their level of education, or their level of technological expertise, should have access to computers and the Internet? Whose responsibility is it to provide aid and instruction and whose money will cover the costs? So why isn't universal Internet access a necessity?arrow_forwardThe continued and rapid use of electronic devices in our daily lives has an impact on the procedures and processes in all areas of the criminal justice system. You read about the presence of electronic devices (e.g., phones, cameras, etc.) and electronic communication, and the impact this technology can have on the trial system. Discuss your views on the topic. What are your thoughts about banning electronic devices in the courtroom? What about juror sequestration, can this really be effective in present day?arrow_forwardComputer Science After you have concluded the readings and lectures this week, think about what the laws do not cover in terms of cybercrime. Where are the gaps? Assume you are the lead staffer for a congressman, what would you recommend for future legislation (realistically – given current available technologies and limitations)? How would you approach a non-technically savvy person and convince them to support your legislation?arrow_forward
- Many people believe that the world of digital technology may be roughly divided into two groups: those who have access to a computer and the Internet, and others who do not. Some people believe that this has substantial ethical implications and that there is a moral obligation to remedy the imbalance. Those who "have nots" may feel discriminated against or socially ostracized, and they miss out on a wide variety of life opportunities as a result. Do you believe that everyone, regardless of where they live, their needs, their level of ability, or their financial means, ought should have access to computers and the Internet? Who is responsible for providing services and education, as well as footing the bill? Why isn't having access to the internet a must for everyone?arrow_forwardType the answers to the following questions and submit the homework assignment via Canvas What is your computer experience so far? (list all that apply)I use the computer for email only I use the computer to look for things on the Web I am self-taught I use computers at work or for my job where I...? I use the computer to do my taxes What applications do you know?Microsoft Word, A game called?, TurboTax, specialized software, security tools, etc What is the ONE thing you would like to know about computers that do not currently know? What is the difference between a threat agent and a threat? What is the difference between a vulnerability and exposure? What are the three components of the C.I.A. trianglearrow_forwardBased on the "Did You Know" videos, what are your thoughts about the technological advances that have been made? Do you believe our society is being responsible in the way we are maintaining or expanding upon these innovations? Are we adequately protecting ourselves from the inherent hazards of advanced technologies? please help to write a report from 150-200 words.arrow_forward
- When you hear the word "email," what are some of the first things that pop into your head? What takes place after an email has been delivered after it has been sent from the sender's inbox? Make a list of everything that you are aware of today that you were unaware of in the past. It would pique my curiosity to find out if anyone has any insight into the circumstances that lead to these inequalities, as it would pique my interest to see if anybody does. Within your firm, is there a variation in the level of complexity from one model to the next?arrow_forwardThe RIAA asserts that downloading copyrighted music on the Internet without paying for it is stealing, but lots of people are doing it. Is this ethical? Why or why not? If this is not ethical, why are so many people doing it?arrow_forwardChris, your roommate, uses your computer in the middle of the night as you sleep. When you go to sleep at night, your roommate Robin steals your vehicle and drives it around for a bit until you wake up. (Neither has your consent, nor does it do harm to you.) Make a list of the features of the two occurrences that are comparable to one another (characteristics related to the effects of the events, ethics, legality, risks, etc.). Make a list of the features of the two occurrences that are distinct from one another. Which of the following would you find more offensive? Why?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Information Technology Project ManagementComputer ScienceISBN:9781337101356Author:Kathy SchwalbePublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Information Technology Project Management
Computer Science
ISBN:9781337101356
Author:Kathy Schwalbe
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning