Ali has chosen improvement of commercial systems and security threat as a research subject for his Informatics Ethics course. He develops an algorithm for the purpose of implementing his project in a practical process. He can find the security vulnerabilities of the companies network systems with this algorithm. He releases that he can reach the security vulnerabilities of some companies with this algorithm and he adds these vulnerabilities to his project as a result of semester’s work. His professor decides that Ali has done a good project and gives him a very high project grade. When one of the companies that Ali has entered searches the source of the attack, they find university laboratory as a source of this attack and informs the authorities of his university. Looking at the scenario discuss the justifications may be given by professor, Ali and the company. Keeping in mind company’s opinion, should Ali be punished by the University? What will be the stance of the University?
Critical Path Method
The critical path is the longest succession of tasks that has to be successfully completed to conclude a project entirely. The tasks involved in the sequence are called critical activities, as any task getting delayed will result in the whole project getting delayed. To determine the time duration of a project, the critical path has to be identified. The critical path method or CPM is used by project managers to evaluate the least amount of time required to finish each task with the least amount of delay.
Cost Analysis
The entire idea of cost of production or definition of production cost is applied corresponding or we can say that it is related to investment or money cost. Money cost or investment refers to any money expenditure which the firm or supplier or producer undertakes in purchasing or hiring factor of production or factor services.
Inventory Management
Inventory management is the process or system of handling all the goods that an organization owns. In simpler terms, inventory management deals with how a company orders, stores, and uses its goods.
Project Management
Project Management is all about management and optimum utilization of the resources in the best possible manner to develop the software as per the requirement of the client. Here the Project refers to the development of software to meet the end objective of the client by providing the required product or service within a specified Period of time and ensuring high quality. This can be done by managing all the available resources. In short, it can be defined as an application of knowledge, skills, tools, and techniques to meet the objective of the Project. It is the duty of a Project Manager to achieve the objective of the Project as per the specifications given by the client.
Ali has chosen improvement of commercial systems and security threat as a research
subject for his Informatics Ethics course. He develops an algorithm for the purpose of
implementing his project in a practical process. He can find the security vulnerabilities of the
companies network systems with this algorithm. He releases that he can reach the security
vulnerabilities of some companies with this algorithm and he adds these vulnerabilities to his
project as a result of semester’s work. His professor decides that Ali has done a good project and
gives him a very high project grade. When one of the companies that Ali has entered searches the
source of the attack, they find university laboratory as a source of this attack and informs the
authorities of his university. Looking at the scenario discuss the justifications may be given by
professor, Ali and the company. Keeping in mind company’s opinion, should Ali be punished by
the University? What will be the stance of the University?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps with 2 images