Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter B, Problem B7.5MBD
Program Plan Intro
Ethics in dealing with information:
- Information itself has not ethics as it has no idea how to preserve itself.
- Dealing with information is bounded with ethical principles that should be followed.
- An information privacy policy should be developed for organizations intending to protect its information.
- Fair information practices denote a set of standards that governs collection and use of personal data and addressing issues for accuracy and privacy.
- It deals with creation, dissemination, organization and usage of information.
- It provides moral framework for information privacy.
- The subjects such as protection of copyright, intellectual freedom, responsibility, privacy as well as security are an important concern.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
1Define intellectual property. 2Explain copyright using an example. 3 When is your intellectual property copyright protected? 4 A patent protects an invention. An invention may be a process, amethod, a machine, a device, a new material, a chemical compoundor chemical composition. In South Africa, in order to be patentable,an invention must meet certain criteria. What 3 criteria must bemet.
The Internet's expanding popularity is a testament to its importance as a platform for expressing one's opinions. On social media platforms like Facebook and Twitter, there is a proliferation of hate speech by both individuals and groups. Is complete freedom of expression on the web practical? Is it possible for social media to curb the spread of hate speech?
The Internet has emerged as a critical medium for the exercise of one's right to free expression. Many persons and groups use Facebook and Twitter to disseminate anti-Semitic content. Is internet speech a right or a privilege? How far should social media go to prevent the spread of hateful content?
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- 1. 2020 shook our world in unimaginable ways, forcing us to face multiple public health emergencies. And, while technology isn’t the primary tool to solve for systemic health issues, it can play an important role in partnership with government and civil society efforts. However, for technology to be effective, it must be built responsibly – and no matter how good a tool is, people won’t use it unless it has their trust. Discuss two (2) ethical issues linked to the use of computer technology in healthcare, specifically related to the COVID-19 pandemic.arrow_forwardKINDLY ANSWER QUESTIONS 1-10 AND CHOOSE THE CORRECT ANSWER ONLY.. (NO NEED EXPLANATION) THANK YOU! 1. The following are true to the definition of Copyright except one. A. Copyright laws are particular with the rights that creators have over their literary works. B. The legal concept of copyright laws is that the creator is given rights to the work for an unlimited time period. C. Copyright laws cover artistic works of creators. 2. Martin had registered two domain names that contain words identical to Dream Works and he claimed that the said websites are used as educational websites that provides English language training but later he was selling the rights to Dream Works. Evidence presented in court showed that Martin never used the disputed domain names. The court then concluded that it was a cybersquatting case. Which of the following instances were committed that made the act punishable? I. The acquisition of a domain name over the internet in bad faith. II. Purpose is to…arrow_forwardThe Internet has become a significant medium for exercising one's right to free speech. Numerous individuals and organizations use Facebook and Twitter to propagate hate speech. Should there be no restrictions on expression in online discussion forums? How far should restrictions on hate speech on social media go?arrow_forward
- The use of the Internet as a forum for expressing one's right to free speech has become more significant in recent years. Both Facebook and Twitter are being used by a diverse range of individuals and organizations to facilitate the dissemination of hate speech. Should there be no restrictions put on what people may say in online discussion forums? Where should the line be drawn when it comes to restricting hate speech on social media?arrow_forwardWith the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet). In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final…arrow_forwardThe role of privacy is important and controversial in today's society. What more needs to be done to ensure privacy while online? For example, do you feel laws are enough?arrow_forward
- D7) China pushing women to have more babies now How has China's policy evolved over the course of time? What are the reasons for this new policy push? Provide your thoughts and reflections on governmental dictates of this type? Do they serve a purpose? Is this something the government should be doing? What's your personal reaction to this type of policy? Considering the demographics outlined in this piece, are there parallels with other nations around the globe?arrow_forwardMany people believe that the world of digital technology may be roughly divided into two groups: those who have access to a computer and the Internet, and others who do not. Some people believe that this has substantial ethical implications and that there is a moral obligation to remedy the imbalance. Those who "have nots" may feel discriminated against or socially ostracized, and they miss out on a wide variety of life opportunities as a result. Do you believe that everyone, regardless of where they live, their needs, their level of ability, or their financial means, ought should have access to computers and the Internet? Who is responsible for providing services and education, as well as footing the bill? Why isn't having access to the internet a must for everyone?arrow_forwardInternet has become essential for practicing free expression. Many individuals and groups use social media to disseminate hate speech. Should online speech be free? How should social media prohibit hostile comments?arrow_forward
- Describe how the development of technology is destroying the values that our society is built on and giving people a break from their moral responsibilities. Explain how the development of technology is destroying the ideas that make our society work and giving people a break from their moral obligations.arrow_forwardAre there any technology on which you rely excessively? Instead of being written down, phone numbers are now being encoded into mobile devices. Some people have a sense of helplessness when they are in a foreign location without a calculator to convert the local currency. Email archives are often used to preserve a person's addresses and appointments. If any of these technological systems collapse, we may not survive. Create a list of the technologies that are absolutely necessary in your life. Think about the consequences that may arise if any of these technologies were to fail. What steps can you take to protect yourself from such a disastrous outcome?arrow_forwardCybersecurity discussion In 2013, Edward Snowden was hired by the NSA after previous employment with the CIA as a systems administrator. In early June of 2013 he revealed thousands of classified NSA documents to journalists Glenn Greenwald, Laura Poitras, Barton Gellman, and Ewen MacAskill about government surveillance programs. By June 21, 2013, the United States Department of Justice unsealed charges against Edward Snowden of two counts of violating the Espionage Act of 1917 and theft of government property, which identified the leak of state secrets as an act of treason. Snowden has become a subject of controversy, both ethically and legally being seen as a traitor, a hero, a whistleblower, a dissident, and patriot. Data Security and Privacy in the Age of Surveillance (Links to an external site.) Edward Snowden: Patriot or Traitor? (Links to an external site.) Edward Snowden is Both A Patriot and A Traitor (Links to an external site.) Using the above short video and articles…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education