All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
business
ethics information age
Questions and Answers of
Ethics Information Age
Compare and contrast the social conditions in the United States that stimulated the growth of the mechanical calculator market in the latter half of the nineteenth century with the social conditions
The Burroughs Adding Machine Company dominated the mechanical calculator market in the 1890s, and IBM dominated the electronic computer industry in the 1960s. What did these companies have in common
Name three ways the development of radar in World War II stimulated advances in computing.
In what way did the Cold War help bring about the personal computer?
Can you think of a practical reason why the semaphore telegraph was adopted more rapidly on the continent of Europe than in the British Isles?
Compare and contrast the social impact of these three information technologies: the telegraph, the telephone, and wireless networks.
In what important ways did the hypertext system of Berners-Lee differ from earlier hypertext systems?
Give four examples from this chapter of how a social condition influenced the development of a new information technology.
Give four examples from this chapter of a social change brought about by the adoption of a new information technology.
Describe similarities and differences between cultural relativism and virtue ethics.
How does BitTorrent provide an order-of-magnitude increase in downloading speed compared to earlier peer-to-peer networks?
What is the difference between having privacy and being alone? Provide examples.
How can an excess of privacy cause harm? How can a lack of privacy cause harm?
What does it mean to say privacy is a prudential right?
Is privacy a negative right or a positive right?
Why is it important that some information be made available to everyone through public records?
Provide an example (not already given in the book) of a situation where people must disclose personal information to a private organization in order to obtain a product or service.
How do retailers use loyalty cards to improve their sales?
What are the advantages of consolidating a patient’s medical records into a single database accessible by many? What are the risks associated with this consolidation?
How could “cookies” created by a Web server affect a computer user’s privacy?
What is the difference between data mining and collaborative filtering?
Explain the difference between an opt-in policy and an opt-out policy. Which policy is favored by privacy advocates?
What lesson should we draw from the release of large datasets in which personal identifiers were replaced by integers?
Determine the relationship between the categories of Daniel Solove’s taxonomy of privacy and the following definitions of privacy proposed by other authors:• Privacy is the right to be left
Give three examples of legislation passed by the US Congress designed to protect the privacy of residents of the United States.
How did the position of the US Supreme Court toward wiretapping evolve over time? Cite the key cases.
Give three examples of US government agencies successfully achieving their ends using data legally obtained from residents of the United States.
Give three examples of US government agencies illegally collecting or disseminating information about residents of the United States in order to achieve their ends.
What are telephony metadata? Briefly summarize the history of the controversy surrounding the collection of telephony metadata by the National Security Agency after 9/11.
Describe similarities and differences between these covert surveillance programs of the US government: Operation Shamrock, Carnivore, PRISM, NSA wiretapping after 9/11, NSA collection of telephony
What are the implications of the Stored Communications Act for all those who let an Internet service provider handle their email?
Why has the expanded use of National Security Letters raised privacy concerns?
Briefly summarize in your own words the five tenets of the Code of Fair Information Practices.
Robert Bellair has said, “The Privacy Act, it turns out, is no protection at all. You can drive a truck through the Privacy Act”. Why do Bellair and other privacy advocates feel the Privacy Act
What actions has the US Congress taken to help ensure people aren’t disadvantaged by poor credit ratings because of erroneous or obsolete information?
Give three examples of how information collected by a government for one purpose has been used for an entirely different purpose.
What are the problems with using the Social Security number as an identification number?
Give two arguments in favor of a national identification card for the United States. Give two arguments against creating a national identification card.
For each category in Daniel Solove’s taxonomy of privacy, give one example of a law passed by the US Congress protecting individual privacy of that type.
How has the term “hacker” evolved since the 1950s?
Describe three “low-tech” methods that hackers have used to obtain login names and passwords.
Why is it dangerous to surf the Web using an open Wi-Fi network?
What is the difference between a computer virus and a worm?
What is the relationship between spyware and backdoor Trojans?
What is the difference between spyware and adware?
How are Trojan horses and drive-by downloads similar?
Why is it dangerous for an email program to open attachments automatically, without waiting for the user to select them?
Give two examples of how criminal organizations have used the Internet to make money.
What is a cyber attack? Give two examples of cyber attacks that have taken place outside the United States.
If converting SCADA systems to the Internet Protocol increases the risk of a hacker taking control of an industrial process, why are companies doing just that?
Explain two different ways a vote thief could cast multiple votes in an online election.
What is the difference between an embedded system and a real-time system?
What is a race condition in software? Why are software race conditions difficult to debug?
Summarize the principal errors made by AECL throughout the life cycle of the Therac-25 linear accelerator.
Why are computer simulations playing an increasingly important role in science and engineering?
What is the difference between the verification of a computer simulation and the validation of a computer simulation?
Name three different ways to validate a computer simulation.
Compare and contrast the meaning of the term “validation” in two areas: computer simulations and software engineering.
Do courts in the United States view software as a product subject to the theory of strict liability? Why or why not?
The following reasons have been given for the failure of computerized systems:a. A system designed for one purpose was used for another purpose.b. Software was reused without adequate testing.c.
Which clauses in the Software Engineering Code of Ethics and Professional Practice support the legitimacy of whistle-blowing? Which clauses in the code may be violated by a whistle-blower (assuming
What is whistle-blowing? What harms does it cause? What benefits may it provide?
Identify five clauses in the Software Engineering Code of Ethics and Professional Practice that reflect a utilitarian ethical viewpoint.
Identify as many clauses as you can in the Software Engineering Code of Ethics and Professional Practice that refer to issues related to intellectual property.
Identify as many clauses as you can in the Software Engineering Code of Ethics and Professional Practice that refer to issues related to privacy.
How prevalent is licensing for software engineers in the United States?
In what ways is a computer-related career, such as programming or system administration, similar to a fully developed profession such as medicine? In what ways is a computer-related career unlike a
When describing a software license, what does the phrase “open source” mean?
Suppose company A wants to develop a program that duplicates the functionality of a program made by company B. Describe how company A may do this without violating the copyrights held by company B.
Briefly describe the most significant changes in the recorded music business in the United States over the past 15 years.
The US Supreme Court ruled that Sony was not responsible for the copyright infringements of Betamax customers, but Grokster and StreamCast were responsible for the copyright infringements of those
How has the Digital Millennium Copyright Act affected fair use of copyrighted material by consumers?
Explain how advances in information technology have made it easier for consumers to violate copyright law.
When referring to copyrighted materials, what is meant by the term “fair use”?
The case study in Section 4.3.5 evaluates two possible actions by Arjun. Perform act utilitarian evaluations of two other actions Arjun could take:Option 3: Arjun does not ask the team of software
What are the relative advantages and disadvantages of patents versus trade secrets?
What are the ways in which individuals or firms in the United States may protect their intellectual property?
What paradoxes arise when we attempt to extend Locke’s notion of a natural right to property into the realm of intellectual property?
What features of intellectual property make it more difficult to protect than physical property?
What are the similarities and the differences between texting and instant messaging?
What is the difference between the Web and the Internet?
Nearly all spam is blocked by spam filters. Why does sending spam continue to be so popular?
What is the Enlightenment view regarding responsibility for addiction?
What physiological reason has been given for the difficulty some people experience detaching themselves from their digital devices?
Define cyberbullying in your own words.
Give two examples of high-tech methods of identity theft and two examples of low-tech methods of identity theft.
Why are college students particularly vulnerable to identity theft?
What is the leading form of identity theft in the United States?
How has sexting by teens created new legal challenges for US states?
Why do broadcasters in the United States have more limited First Amendment rights than book publishers?
What characteristics of the Internet make the censorship of Internet content difficult?
Define censorship in your own words.
Why do businesses and governments often use utilitarian thinking to determine the proper course of action?
Think of a real-life law or policy that violates the difference principle.
Describe similarities and differences between cultural relativism and social contract theory.
Describe similarities and differences between Kantianism and social contract theory.
Evaluate the four scenarios presented in Section 2.1.2 from a Kantian perspective.
Evaluate the four scenarios presented in Section 2.1.2 from an act utilitarian perspective.
Evaluate the four scenarios presented in Section 2.1.2 from a rule utilitarian perspective.
Evaluate the four scenarios presented in Section 2.1.2 from the perspective of social contract theory.
Showing 200 - 300
of 321
1
2
3
4