Privacy-Ethics and Social Responsibility

Assignment Help Basic Computer Science
Reference no: EM132748226

Discussion: Privacy, Ethics, and Social Responsibility

What does it mean to you when you think about your privacy rights? Should you even have an expectation of privacy in today's electronic world? This week, Dr. LeClaire is sharing with us some very important information with us about how we should think about our privacy. Then he's also sharing about how businesses should act regarding the vast volumes of information that they're collecting. What are their responsibilities here? How does morality fit into all of this? Is there even such a thing as a ‘right to privacy'? I don't recall seeing that in the US Constitution, but you may be able to find something out there convincing me otherwise.

social responsibility :

Why should a business concern itself with ‘being green'? There have been numerous occasions where employees have pushed their companies to into the direction of greater social responsibility. What impact does this have on the organization? If ‘going green' results in lower profits that are offset by reduced staffing, how would you feel about that. If it resulted in greater cost saving through reduced resource use, should that saving be passed along to the employees that pushed for it? What are the other issues here?

After reviewing the lecture this week, share with me and your peer students your thoughts on privacy, ethics, and social responsibility. Have you been involved in activities that you found unethical? What did you do about it? Have you been involved in an organization that pushed for social change at your workplace (not simply Occupy Wall Street or other generic cause)?

Reference no: EM132748226

Questions Cloud

Cloud providers that want your company business : There are many Cloud Providers that want your company's business.
What is the cloud computing reference architecture : Define cloud computing. List and briefly define three cloud service models. What is the cloud computing reference architecture?
Cybersecurity attack on water utility SCADA system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Firewalls are essential to maintaining security : Firewalls are essential to maintaining security, such as supporting valid communications and blocking malicious traffic.
Privacy-Ethics and Social Responsibility : What does it mean to you when you think about your privacy rights? Should you even have an expectation of privacy in today's electronic world?
Firewalls are essential to maintaining security : Firewalls are essential to maintaining security, such as supporting valid communications and blocking malicious traffic.
What type of new countermeasures : What type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring.
The structure and scope of operations : Consider the music business as a supply network. How has music downloads and streaming affected artists' sales?
Rewards of international business for two firms : Consider the main risks and rewards of international business for two firms. In the case of a large established domestic firm which of the potential rewards is

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss management information systems

What successes and failures have businesses seen during the growth of technology? Discuss Management Information Systems (MIS) and its uses in an organization.

  How would you modify the node-insertion algorithm

How would you modify the node-insertion algorithm described in Section 20.7.7?

  Effect of two independent variables on dependent variable

1. In two-way ANOVA, we study not only the effect of two independent variables on the dependent variable, but also the ___ between these variables.

  What model might you use to model x

O-rings. Failures of O-rings on the space shuttle are fairly rare, but often disastrous, events. If we are testing O-rings, suppose that the probability of a failure of any one O-ring is 0.01. Let X be the number of failures in the next 10 O-rings..

  Write two programs to compare the actual running times

Figure 7.5 shows the best-case number of swaps for Selection Sort as Θ(n). This is because the algorithm does not check to see if the ith record is already in the ith position; that is, it might perform unnecessary swaps.

  Purpose of the sql server management studio designers

What is the purpose of the SQL Server Management Studio Designers? Does this tool create only a physical model, or does it create the actual database?

  Effect facilitate the creation of money

How does the multiplier effect facilitate the creation of money?

  How organizations implement their it systems

Does the public have the right to know how organizations implement their IT systems?

  Equation to find the total cost of the bill

Repair-It charges $60 for a service call plus $25 per hour to repair the appliance. Let h represent the number of hours and C represent the total cost for the repair. Write an equation to find the total cost of the bill to fix your appliance after h ..

  What incentive conflict was being controlled

What incentive conflict was being controlled by these loyalty payments. What advice did Intel ignore when they adopted this practice

  Disadvantage of using tcp as a transport protocol

First, name one advantage and one disadvantage of using TCP as a transport protocol. Then, name one advantage and one disadvantage of using UDP as a transport.

  Uk firms competing with european ones

Given that fuel taxes are higher in the UK than the rest of Europe, what implications does this have for UK firms competing with European ones?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd