Experiencing MIS
8th Edition
ISBN: 9780134792736
Author: KROENKE
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 1EGDQ
a)
Explanation of Solution
“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to categorical imperative.
Reason:
Categorical imperative is that in all situations the complete requirements must be followed and it should be acceptable as an end in it.
- According to categorical imperative, creating the free app is ethical in all situations because it contains the complete requirements which are acceptable.
- It is a law which is unconditional for each and every agent.
b)
Explanation of Solution
“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to utilitarian perspective.
Reason:
Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility.
- According to utilitarian perspective, creating the free app is ethical as it reducing the illegal harvesting the individual data by improving the legal harvesting the individual data.
- This is benefitting both developer and users.
- In such cases, there is a risk of hampering the privacy of the users but it is considered as ethical as long as it is transparent.
c)
Explanation of Solution
Reaction of the user to harvest the data to free app:
The user reaction at the time of the harvest the data while exchange of free app comes under in two cases; they are as follows:
- Some user may think it as optimist way, that is, user must share the data which is necessary to free app. Then only user can access the app with free of cost.
- Some user may think it as pessimist way, that is, user takes it as negative way that personal data can be shared
Want to see more full solutions like this?
Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
(e) Based on the type of hacker you select, explain whether a hacker should be legally prosecuted in they break into a device and review or perhaps revise or destroy the data in the device.
(f) If you feel the hacker is doing something of benefit, explain your thoughts.
(g) Every person in the class must present their own unique situation regarding ergonomics so there should be no duplicates from anyone in the class when they present their Discussion entry.
Is it OK, in your view, to give up a negligible amount of personal information in exchange for free or almost free software? Is there a way to make them responsible for the data that they gather and how they utilise it, and is this technique even possible? Always be prepared to provide an argument in support of your stance. Your assertion has to be backed up by some kind of proof.
For this assignment you are to find 3 real-world examples of identity theft, preferably medical id theft, but any type will be accepted.
One of the examples should be your own if you were an id theft victim (I personally have been a financial id theft victim twice) or someone you know. This will allow you to know the details of how the theft occurred and how it was handled.
One of the examples must come from research news stories and other resources found on the Web. Provide a link to each website in your report..
The final example may be personal or a news story.
For each case, identify the type of ID theft that occurred, and answer these questions: what did the thief do (if known) to acquire the information, how was it discovered, what were the damages incurred, how long did it take to resolve the problems caused by the id theft?.
Chapter 4 Solutions
Experiencing MIS
Ch. 4.2 - Prob. 1SWCh. 4.2 - Prob. 2SWCh. 4.2 - Prob. 3SWCh. 4.2 - Prob. 4SWCh. 4.2 - Prob. 5SWCh. 4.2 - Prob. 6SWCh. 4 - Prob. 1EGDQCh. 4 - Prob. 2EGDQCh. 4 - Prob. 3EGDQCh. 4 - Prob. 4EGDQ
Ch. 4 - Prob. 1ARQCh. 4 - Prob. 2ARQCh. 4 - Prob. 3ARQCh. 4 - Prob. 4ARQCh. 4 - Prob. 1UYKCh. 4 - Prob. 2UYKCh. 4 - Prob. 3UYKCh. 4 - Prob. 4CECh. 4 - Prob. 5CECh. 4 - Prob. 6CECh. 4 - Prob. 7CECh. 4 - Prob. 8CECh. 4 - Prob. 9CSCh. 4 - Prob. 10CSCh. 4 - Prob. 11CSCh. 4 - Prob. 12CSCh. 4 - Prob. 13CSCh. 4 - Prob. 14MLMCh. 4 - Prob. 15MLM
Knowledge Booster
Similar questions
- With the advent of various technological advancements, law enforcement efforts in the investigation and prosecution of crime have been met with positive results. However, with every advantage comes a disadvantage. Criminals have also benefited from these technologies and use the same advancements that law enforcement employs during the commission of their crimes, or as a tool for their crimes (this is evidenced in computer-related offenses and the misuse of the internet). In a 3 – 4 page paper (excluding title and reference pages), address the following areas in full detail: summarize the advantages of computers/software and the use of computer technology in investigations, summarize the disadvantages to law enforcement with respect to the advancements of computers, research a case where the computer was used to aid in the commission of a crime, research a case where the use of the computer was beneficial to the prosecution in a criminal case, and provide a final…arrow_forwardSET 1 a) Discuss and describe an important idea or hypothesis from the course. b) How can you use this explanation to explain a personal experience? Please be as specific as possible. The aim of this written submission is for you to focus on the events of your life (work/school/family/friends) and use them as an excuse to put what you've learned in class into reality. Try to answer the following questions when you write your submissions 3) In your view, what elements of the idea, hypothesis, or suggestion fit well?arrow_forwardSET 1 a) Discuss and describe an important idea or hypothesis from the course. b) How can you use this explanation to explain a personal experience? Please be as specific as possible. The aim of this written submission is for you to focus on the events of your life (work/school/family/friends) and use them as an excuse to put what you've learned in class into reality. Try to answer the following questions when you write your submissions. 1) What did you take away from the encounter?arrow_forward
- Is it impossible to provide opposing views on the topic of IT?arrow_forwardPlease Answer my question from given document whose link is given below. Please download it by clicking on Receving Button on this site to read this 5 page document Based on Memory and Learning. Link : sendanywhe.re/EN29TOI2 Question : Answer the Question below : a.) What is the P150 component in the experiment? b.) Which aspect of learning is being studied using P150 in the experiment. c.) How are the conclusions drawn?arrow_forwardAre you able to offer a definition for each of the terms "data," "information," and "knowledge," as well as some examples?arrow_forward
- Consider the following scenario: you've been tasked with developing a logical model of a school or college's registration system. Is a top-down strategy preferable, or is a bottom-up approach preferable in this situation? What considerations could have an influence on your decision?arrow_forwardMaking Elevators Go Faster!This story has been reported in numerous places and has almost become a classic example to explain the need for problem identification. Ackoff (as cited in Larson , 1987) described the problem of managing complaints about slow elevators in a tall hotel tower.After trying many solutions for reducing the complaint: staggering elevators to go to different floors, adding operators, and so on, the management determined that the real problem was not about the actual waiting time but rather the perceived waiting time. So the solution was to install full-length mirrors on elevator doors on each floor. As Hesse and Woolsey (1975) put it, "the women would look at themselves in the mirrors and make adjustments, while the men would look at the women, and before they knew it, the elevator was there ." By reducing the perceived waiting time, the problem went away. Baker and Cameron 0996) give several other examples of distractions, including lighting,…arrow_forwardChoose the correct answer in the picture below.arrow_forward
- A wide variety of everyday objects (including attractions at amusement parks, autos, elevators, and ovens) are really computers or information systems these days. The typical person would not connect them to a computer or database. The benefits are obvious, but are there any downsides to consider? As an example, if you rode a computer-controlled roller coaster, how confident would you be in its safety? As more and more mundane tasks are automated by computers, we have to ask whether the benefits are worth the cons. If so, then explain why.arrow_forwardKindly read it properly. And answer correctly And do only if you know.arrow_forwardIs it permissible, in your opinion, to trade a small amount of privacy for free or nearly free software? Is there a method to hold them accountable for the data they collect and how they use it? Always be ready to defend your position. There must be evidence to support your claim.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Systems ArchitectureComputer ScienceISBN:9781305080195Author:Stephen D. BurdPublisher:Cengage Learning
Systems Architecture
Computer Science
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Cengage Learning