Protecting personal data-email system with targeted ads

Assignment Help Basic Computer Science
Reference no: EM131056541

Scenario 1: Protecting Personal Data

Your customer is a community clinic that works with families with problems of family violence. It has three sites in the same city, including a shelter for battered women and children. The director wants a computerized record and appointment system, networked for the three sites. She wants a few laptop computers on which staffers can carry records when they visit clients at home and stay in touch with clients by email. She asked about an app for staffers' smartphones by which they could access records at social service agencies. At the shelter, staffers use only first names for clients, but the records contain last names and forwarding addresses of women who have recently left.

Scenario 2: Email System With Targeted Ads

Your company is developing a free email service that will include targeted advertising based on the content of the email messages (similar to Google's Gmail). You are part of the team designing the system.
What are your ethical responsibilities?

Scenario 3: Webcams in School Laptops

As part of your responsibilities, you oversee the installation of software packages for large orders.

A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam.

Please help to analyse this scenario according to this steps:

Identify responsibilities of the decision maker

Identify rights of stakeholders

Consider the impact of the options on the stakeholders (consequences, risks, benefits, harms, costs)

Categorise each potential action as ethically obligatory, prohibited, or acceptable

When there are multiple options, select one, considering the ethical merits of each, courtesy to others, practicality, self-interest, personal preferences, etc.

Reference no: EM131056541

Questions Cloud

High level plan for handling contingencies : Write a 2-3 page (single spaced) high level plan for handling contingencies in a large bank with many branches in the united states. A detail plan will be much longer focus on only the high level plan and include those aspects that you think are r..
Manager of a medium-sized retailing operation : Hugo is the manager of a medium-sized retailing operation and is concerned about the collection of monies for goods sold. He has a current policy for collecting monies from credit customers and all goods are sold on credit.
Analyse and present cogent argument for the particular case : You will be assessed on your ability to reason, analyse and present cogent argument for the particular case. You should outline the main statement you wish to make about your chosen ethical issue along with your reasons and others' objections to i..
Processes that have a particular file pathname open : Write a program that lists all processes that have a particular file pathname open
Protecting personal data-email system with targeted ads : Your customer is a community clinic that works with families with problems of family violence. It has three sites in the same city, including a shelter for battered women and children. The director wants a computerized record and appointment syste..
Final stage of the multiplexing : Two channels, one with a bit rate of 100 kbps and another with a bit rate of 200 kbps, are to be multiplexed. Assume that each output slot carries 2 bits from each digital source. Answer the following questions about the final stage of the multipl..
Discuss the three indicators of health : Discuss the three indicators of health: life expectancy, infant mortality, and subjective well-being for the state of Virginia in 150 words. Find out the statistics and facts about the life expectant, infant mortality and the subjective well being..
Experiment with different file and buffer sizes : Try performing these timing tests on a range of file systems (e.g., ext3, XFS, Btrfs, and JFS). Are the results similar? Are the trends the same when going from small to large buffer sizes?
What is the location : What is the location from which the 1st computer instructions are available on boot up?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd