Business Essentials (12th Edition) (What's New in Intro to Business)
12th Edition
ISBN: 9780134728391
Author: Ronald J. Ebert, Ricky W. Griffin
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Question
Chapter 14, Problem 14.21EE
Summary Introduction
Given scenario:
The given situation explains the privacy policy of a company which monitors its employee’s internet and email usage behavior. A person working in a biotechnology company has been promoted to a first-line manager at a local store. The top-level official explains that the company monitors its employee’s internet usage behavior to avoid sharing of confidential information and trade secrets.
To determine: The ethical issues for the given situation.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What standards should organizations apply to help ensure information security? How can we help as employees?
What steps can we take to protect our personal information from being missused?
I would appreciate it if you could define hacks and viruses and provide examples of how a company
may go about preventing them from accessing company data.
What risks will arise from this?
How does management ensure that information is being accessed only by authorized and relevant employees?
Chapter 14 Solutions
Business Essentials (12th Edition) (What's New in Intro to Business)
Ch. 14 - Prob. 14.1QRCh. 14 - Prob. 14.2QRCh. 14 - Prob. 14.3QRCh. 14 - Prob. 14.4QRCh. 14 - Prob. 14.5QRCh. 14 - Prob. 14.6QACh. 14 - Prob. 14.7QACh. 14 - Prob. 14.8QACh. 14 - Prob. 14.9AECh. 14 - Prob. 14.10AE
Ch. 14 - Prob. 14.11ACh. 14 - Prob. 14.12ACh. 14 - Prob. 14.13ACh. 14 - Prob. 14.14ACh. 14 - Prob. 14.15ACh. 14 - Prob. 14.16TECh. 14 - Prob. 14.17TECh. 14 - Prob. 14.18TECh. 14 - Prob. 14.19TECh. 14 - Prob. 14.20TECh. 14 - Prob. 14.21EECh. 14 - Prob. 14.22EECh. 14 - Prob. 14.23EECh. 14 - Prob. 14.24CCh. 14 - Prob. 14.25CCh. 14 - Prob. 14.26CCh. 14 - Prob. 14.27CCh. 14 - Prob. 14.28CCh. 14 - Prob. 14.29CCh. 14 - Prob. 14.30CCh. 14 - Prob. 14.31CCh. 14 - Prob. 14.32CCh. 14 - Prob. 14.33C
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, management and related others by exploring similar questions and additional content below.Similar questions
- You have a duty to learn about the most important problems that can happen with information systems and the ways that your company has found to be the most effective at minimising the effects of these kinds of problems.arrow_forwardDo IT professionals face moral dilemmas while deciding whether or not to encrypt their work emails?arrow_forwardWhy is information security a management problem? What can management do that technology cannot?arrow_forward
- What should a company do when it comes to notifying citizens/customers of a data breach?arrow_forwardWhat are some best practices for managing the volume of information that a business encounters while maintaining privacy for employees, customers, and protecting of company data?arrow_forwardIdentify several personal characteristics needed to be successful in an information system career. Do you feel that you possess any of these characteristics?arrow_forward
- What are the advantages and disadvantages in your opinion, of mass sending unsolicited email to a large number of people? Give an example from a real-world situation to support your response.arrow_forwardYou should be aware of some of the most important information system concerns and the best ways to deal with them in your organisation.arrow_forwardDiscuss the three types of information security policy proposed by NIST SP 800-14.arrow_forward
- You'll need to recruit professionals like graphic designers and media producers if you want to start a media firm. Put together a list of the equipment that will be given to the workers in each department, and provide an explanation of why it's needed. When it comes to data, how can they guarantee its security?arrow_forwardPlease original work Data mining techniques can be used to monitor your buying habits,what you view on the Internet and on television, where you go, what you eat, the medical care you receive, etc. The government, military, and corporations all use data mining techniques today. This presents numerous privacy and ethical concerns. Please provide a scholarly reference and confer about the ethics of data mining. Who should own your data?arrow_forwardHow can businesses ensure that they are collecting and using personalized data in a transparent and secure way that respects individuals' privacy rights? 500 wordsarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you