Ethical prisms of utilitarianism

Assignment Help Basic Computer Science
Reference no: EM132147963

Is it ethical for Facebook to mine its users' posts for signals that those users are about to go through a break up? Is it ethical for the company to then help its clients target their ads based on this research?

Is what Facebook is doing different from what other companies do?

How might Facebook's actions be perceived through the ethical prisms of utilitarianism, rights, justice, virtue, and the common good?

Reference no: EM132147963

Questions Cloud

Demonstrate personal passion for your position : Debate It - Take a position on this statement: Democracies need an investigative, confrontational press it can trust - not reality TV news.
Provide a step-by-step description of the attack : Show how someone who is on the no-fly list can manage to fly provided that boarding passes could be generated online (as an HTML page) and then printed.
Er database modeling question : Employees have an id, name, department and datejoined. A manager who is also an employee is managing a department and can be a manager of several employees
Maps candidate names to votes received : Given a variable, election_results, that is associated with a dictionary that maps candidate names to votes received, associate the name of the candidate
Ethical prisms of utilitarianism : How might Facebook's actions be perceived through the ethical prisms of utilitarianism, rights, justice, virtue, and the common good?
Define the concept of human rights : Define the concept of human rights as it fits with your personal philosophy of global education.
Post-acquisition evaluation of technology : In mergers and acquisitions there is always a pre-acquisition evaluation and post-acquisition evaluation of technology
When you do plug it in : Q) VirtualBox aside, what steps do you think are required if we bought a brand new drive and plugged it into our system internally?
Create a new database called membership2 : Use the Management Studio to create a new database called Membership2 using the default settings. (If the database already exists, use the Management Studio to

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Research wireless standard

Research the 802.11 wireless standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, etc.), and describe each of them in 1-2 paragraphs.

  What are the potential problems of poor database design

1. Discuss some of the ways in which data mining can help a company generate more business.

  Pyramids of egypt have programmable calculus

Name 3 reasons why pyramids of Egypt have programmable calculus?

  Main reasons why visualization technologies are important

Determine the main reasons why visualization technologies are becoming an important part of organizational success. Select two (2) such technologies related to information systems and analyze the manner in which the utilization of the selected tec..

  Write a function that receives three values

Write a second function that will calculate the following expression for a given value of N. Use the second function in a program to calculate the expression for N values of 3, 4 and 5. Save the values in three variables

  Access and its limitations in distributed business model

describe the difference of the two terms and how they work together. Your post should include the following details: A description of Access and its limitations in a distributed business model.

  What influence do differences have on fundamental equation

As the number of runs of the executable programs grows ("goes to infinity"), prove that the difference in compilation time on the two platforms becomes irrelevant for the total time for the program.

  What needs to be done to avoid such problem

Based on our class discussion regarding E-R Diagrams, if an attribute is appearing in a number of entity sets does this situation lead to the issue of data redundancy? If yes, what needs to be done to avoid such problem?

  Execution time in loading data from memory

Suppose you are designing a processor targeting programs that spend 20% of their execution time in loading data from memory and 10% of their time

  Identify tactical

Conduct research to find examples of the differences between I.T. security controls and countermeasure gap analysis, and identify tactical, strategic, risk mitigation, threats, and vulnerability dimensions and gaps associated with compliance recom..

  How many sins would be committed daily

If each of these women is brushed (intentionally or accidentally) 10 times each day by one or more men, how many sins would be committed daily?

  What is the lowest height of a seat

Write a sine equation to model the height of a seat that was at the equilibrium point heading upward when the ride began.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd