
Pearson eText for Computer Science: An Overview -- Instant Access (Pearson+)
13th Edition
ISBN: 9780137503216
Author: Glenn Brookshear, Dennis Brylow
Publisher: PEARSON+
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 0, Problem 5SI
Explanation of Solution
Government Regulation of computer technology:
- There are dangers to private security, exploitation of interests of the one group, misuse of information, threat to personal information and domination by the vested interests. Therefore, the government needs to regulate the computer technology.
- In order to ensure fair access to the banking services and economy, government should regulate and make laws so that the interest of all the groups is protected.
- Government should regulate the amount of charge levied on the service charges and should ensure fair competition among various services providers so that the customer is able to choose between various banks.
- Moreover, there has to be more than one choice, so that either one can choose checks, payroll card or direct deposit or other methods.
There are federal laws on direct deposit, but states can also make regulations. The Electronic Fund Transfer Act (EFTA) protects employers and employees who use features like direct deposit. Federal law says that employers can make direct deposit mandatory. However, one of the following conditions must be met:
- The employee must be able to choose the bank for direct deposit.
- If the employer chooses the bank, it must offer another form of payment for the employee, such as a paper check
The rights of the children and family with respect to privacy need to be protected.
- Government should regulate regulations so that privacy is not compromised, intruded and disclosed to strangers and hackers.
- The prior permission needs to be obtained regarding what is being shared and what information is available to the companies associated with interactive TV.
- Personal and Private data need to be highly protected with high end security and anti-virus and anti-theft programs, so that it is shared only with the concerned person. It is highly unethical to pose threat to children to obtain information about the children.
Conclusion:
- Therefore, the government should regulate regulations to the extent so that economic growth is not hampered and the advancement of technology is not stagnant.
- It is the duty of the elected government to protect human right with regards to privacy, free access to economic services and decide the amount of charges that is borne by consumers in banking services, sidewise allowing the open access to market for better infrastructure and technology.
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
I need to define and discuss the uses of one monitoring or troubleshooting tool in Windows Server 2019. thank you
I would likr toget help with the following concepts:
- Windows Server features
- Windows Server versus Windows 10 used as a client-server network
I need to define and discuss the uses of one monitoring or troubleshooting tool in Windows Server 2019. thank you
Chapter 0 Solutions
Pearson eText for Computer Science: An Overview -- Instant Access (Pearson+)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Please solve and answer the questions correctly please. Thank you!!arrow_forwardConsidering the TM example of binary sum ( see attached)do the step-by-step of execution for the binary numbers 1101 and 11. Feel free to use the Formal Language Editor Tool to execute it; Write it down the current state of the tape (including the head position) and indicate the current state of the TM at each step.arrow_forwardI need help on inculding additonal code where I can can do the opposite code of MatLab, where the function of t that I enter becomes the result of F(t), in other words, turning the time-domain f(t) into the frequency-domain function F(s):arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning

Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning

Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,

Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning

Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning