Computer Science An Overview Ap Edition
13th Edition
ISBN: 9780134891729
Author: J. Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 4, Problem 7SI
Explanation of Solution
Software registration process on ethical viewpoint:
The user provides some personal information before using the software services such as his name, age, profession, etc. The user should be very careful while giving personal information to software’s developers. The misuse of the personal information can be avoided by taking some preventive actions.
The users are entitled to certain agreements while registering any software services which are given as:
- The developers can access the personal information such as name age profession of the user for any kind of genuine purpose.
- The trust factor should be there before providing any personal information during the software registration process...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Operating systems and most other types of software aren't completely bug-free when they're initially launched. There are applications out there that have tens of thousands of issues, which are referred to as bugs. Known problems with published software are routinely corrected by software firms via the provision of fixes (also known as patches). The day after a new vulnerability is publicly disclosed, hackers and other criminals often launch zero-day assaults to exploit it. No one can deny that these criminals' actions are unethical, but in the event that their negligence or haste to market causes harm to customers, what duty does a software firm have? What responsibilities do computer users have in terms of staying up to date on security patches?
When operating systems and most other types of software are first released, they are not completely bug-free.There are applications available that contain tens of thousands of bugs.Known flaws in published software are routinely addressed by software companies through the distribution of patches (also known as patches).Hackers and other criminals frequently launch zero-day attacks the day after a new vulnerability is publicly disclosed. No one can deny that these criminals' actions are unethical, but what duty does a software company have if their negligence or haste to market causes harm to customers? What are computer users' responsibilities in terms of staying up to date on security patches?
Casual Observer Software’s main product is a program that monitors and analyzes user keystrokes and mouse clicks to learn more about the way employees use their computer systems. The problem is that some users feel this is an unwarranted intrusion into their privacy, and they prefer not to be observed. Some even fear that the data would be used for other reasons, including performance appraisal. You are a consultant who has been hired by a client firm that is trying to decide whether or not to use this software. Before you advise the client, remember the Hawthorne effect, which suggests that employees might behave differently when they know they are being observed. Finally, think about the ethical issues that might be involved in this situation. What will you advise your client, and why?
Chapter 4 Solutions
Computer Science An Overview Ap Edition
Ch. 4.1 - What is an open network?Ch. 4.1 - Prob. 2QECh. 4.1 - What is a router?Ch. 4.1 - Prob. 4QECh. 4.1 - Prob. 5QECh. 4.1 - Prob. 6QECh. 4.2 - Prob. 1QECh. 4.2 - Prob. 2QECh. 4.2 - Prob. 3QECh. 4.2 - Prob. 4QE
Ch. 4.2 - Prob. 5QECh. 4.2 - Prob. 6QECh. 4.2 - Prob. 7QECh. 4.2 - Prob. 8QECh. 4.3 - Prob. 1QECh. 4.3 - Prob. 2QECh. 4.3 - Prob. 3QECh. 4.3 - Prob. 4QECh. 4.3 - Prob. 5QECh. 4.4 - Prob. 1QECh. 4.4 - Prob. 2QECh. 4.4 - Prob. 3QECh. 4.4 - What keeps a computer on the Internet from...Ch. 4.5 - Prob. 1QECh. 4.5 - Prob. 2QECh. 4.5 - Prob. 3QECh. 4.5 - Prob. 4QECh. 4.6 - Prob. 1QECh. 4.6 - Prob. 2QECh. 4.6 - Prob. 3QECh. 4.6 - Prob. 4QECh. 4.6 - Prob. 5QECh. 4 - Prob. 1CRPCh. 4 - Prob. 2CRPCh. 4 - Prob. 3CRPCh. 4 - Prob. 4CRPCh. 4 - Prob. 5CRPCh. 4 - Prob. 6CRPCh. 4 - Prob. 7CRPCh. 4 - Prob. 8CRPCh. 4 - Prob. 9CRPCh. 4 - Prob. 10CRPCh. 4 - Prob. 11CRPCh. 4 - Prob. 12CRPCh. 4 - Prob. 13CRPCh. 4 - Prob. 14CRPCh. 4 - Prob. 15CRPCh. 4 - Prob. 16CRPCh. 4 - Prob. 17CRPCh. 4 - Prob. 18CRPCh. 4 - Prob. 19CRPCh. 4 - Prob. 20CRPCh. 4 - Prob. 21CRPCh. 4 - Prob. 22CRPCh. 4 - Prob. 23CRPCh. 4 - Prob. 24CRPCh. 4 - Prob. 25CRPCh. 4 - Prob. 26CRPCh. 4 - Prob. 27CRPCh. 4 - Prob. 28CRPCh. 4 - Prob. 29CRPCh. 4 - Prob. 30CRPCh. 4 - Prob. 31CRPCh. 4 - Prob. 32CRPCh. 4 - Prob. 33CRPCh. 4 - Prob. 34CRPCh. 4 - Prob. 35CRPCh. 4 - Prob. 36CRPCh. 4 - Prob. 37CRPCh. 4 - Prob. 38CRPCh. 4 - Prob. 39CRPCh. 4 - Prob. 40CRPCh. 4 - Prob. 41CRPCh. 4 - Prob. 42CRPCh. 4 - Prob. 43CRPCh. 4 - Prob. 44CRPCh. 4 - Prob. 45CRPCh. 4 - Prob. 46CRPCh. 4 - Prob. 47CRPCh. 4 - Prob. 48CRPCh. 4 - Prob. 49CRPCh. 4 - Prob. 50CRPCh. 4 - Prob. 1SICh. 4 - Prob. 2SICh. 4 - Prob. 3SICh. 4 - Prob. 4SICh. 4 - Prob. 5SICh. 4 - Prob. 6SICh. 4 - Prob. 7SICh. 4 - Prob. 8SICh. 4 - Prob. 9SICh. 4 - Prob. 10SICh. 4 - Prob. 11SICh. 4 - Prob. 12SI
Knowledge Booster
Similar questions
- Casual Observer Software’s main product is a program that monitors and analyzes user keystrokes and mouse clicks to learn more about the way employees use their computer systems. The problem is that some users feel this is an unwarranted intrusion into their privacy, and they prefer not to be observed. Some even fear that the data would be used for other reasons, including performance appraisal. You are a consultant who has been hired by a client firm that is trying to decide whether or not to use this software. Before you advise the client, go back to Chapter 4 and consider the Hawthorne Effect, which suggests that employees might behave differently when they know they are being observed. Finally, think about the ethical issues that might be involved in this situation. What will you advise your client, and why?arrow_forwardINTI Online Book Purchasing System is a system to help student in book purchasing. The main objective for the system is to keep track of student records, student orders and the available books. The student may search for books before they order the books online. The system operator is responsible to verify the order submitted by the students. The order is process when it is available otherwise, a purchase order will be prepared. A feedback is send to the student when the process is completed. Each student will be characterized by a unique ID number, name, address and contact number. Each book holds information on the book title, author, category, and ISBN number. Student Order characterized by an ID number, date ordered, and quantity. Each order is associated with only one student. One student may have many orders and each order contains one or many book orders. Book order is characterized by order-number, date, ISBN number, quantity and total. Any book order is related to one and only…arrow_forwardMost software, including operating systems, is not error free when it is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities?arrow_forward
- What exactly are some examples of situations in which overfitting could take place?arrow_forwardPLZ help with the following:arrow_forwardDesktop Support Technician What was a recent challenge in which you were involved and how did you go about solving it? Please include a description of the context for the challenge (project, broken system, etc.) Please define the objective that was to be achieved. Please describe the steps taken and the goals of each step. Please describe why this particular case was chosen and the results of the effort. Please feel free to add any other information that you believe to be important in relating this.arrow_forward
- User Requirements DocumentSection 1 Introduction A Programming Competition System is hosting a programming competitions and allows participants() to log onto the system and perform different tasks. Programming competitions are a fun way for scholars, university students as well as school students, to engage with each other and get exposure to the feel of what programming is about instead of the generic hacker mentality every individual has. The aim is to create a system that allows hosts to carry out programming competitions and provides the participants with all the rules and requirements and other necessary details on the upcoming programming competitions as well as part-take in these competitions. This process is usually done manually so the system is going to simplify the process and make everything digitally available. This makes it easier for the hosts to keep track of every candidate and check for qualified participants. Question 1 Draw an ER Diagramarrow_forwardWhat kind of maintenance do you recommend for a software system used by a well-known furniture manufacturing company? Also, be sure you have enough facts to back up your answer. If the customer had just purchased a new computer-based application, they may have encountered elements that had never worked properly before, such as a broken order placement module or an inaccurately created invoice. These concerns emerged quickly after installation and are often critical, requiring immediate attention to prevent disrupting normal business operations.arrow_forwardRei computer program was published by distributed by her company without her consent. This happened a year after Rei resigned from her position. Do you think a cybercrime was committed? * No, there wasn't what the company did was in their jurisdiction considering that Rei was their former employee Yes there was, Rei is a victim of social engineering since they published the program without the distribution rights or even consent given by Rei No, there wasn't since it is a computer program and copyright only applies to materials that are literary Yes there was, Rei was a victim of copy right infringement since the creative right of the program is own by its developer or the programmer and without Rei consent what the company did was unlawfularrow_forward
- The operating environment has been defined, but could you provide an example of it as well?arrow_forwarddjango python backend create a table in the data base to add an optional activity level, level 1 powerpoint, level 2 demo, level 3,- specific taskarrow_forwardHomework 5 - Write the Security plan for the software that implements on-line auction system Guidelines: The security plan should outline the authentication and authorization, and privacy requirements for the software The known threats to the system should be described along with a plan for managing each threat.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:CengagePrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning