Question: Note: Hand writing Please Course: IT Professional Issues Ahmad uses a caller ID app which helps him identify undesired calls or spam calls by showing
Note: Hand writing Please
Course: IT Professional Issues
Ahmad uses a caller ID app which helps him identify undesired calls or spam calls by showing him the name of the caller even if the caller phone number is not in Ahmads contact list. The application works by uploading Ahmads and other users contact list to a database after taking permission from users such as Ahmad. However, the application does not take the permissions from the people who are in Ahmads contact list. From Kantian 1st and 2nd formulation perspective, is it wrong for Ahmad to use This application?
note: NEED A UNIQUE ANSWER AND NO HANDWRITING PLEASE..
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
