Relevant published professional ethics codes

Assignment Help Basic Computer Science
Reference no: EM131472015

1. You have hired a new salaried employee to develop security protocols for your company. The employee is very ambitious. You are concerned that his plans are to collect a salary from you until he develops something he views as commercially viable, then quit and attempt to market the protocols you have paid him to develop.

i. What steps can you take to protect yourself and your company?

ii. What specific contractual language is most likely to protect your company against employee disclosures or theft of confidential information?

2. Most websites contain privacy statements. What are the advantages of privacy statements to the owners of websites? Include in your answer considerations related to choice of law, customer expectations relating to privacy, and fair information practices.

3. Jim is a consultant; small businesses hire him to advise them on their computer needs. Recently, he was hired by a company interested in upgrading its hardware and software to manage customer relations. Jim has been hired to evaluate proposals. Jim concludes that the best alternative is from Customers-R-Us, and he explains why he recommended Customers-R-Us in his report. But Jim fails to mention that he is a silent partner (co-owner) in Customers-R-Us.

i. Did Jim act unethically? Why or why not?

ii. Should he have disclosed his ties to Customers-R-Us? Why or why not?

iii. Should Jim have declined the consulting job once he learned that Customers-R-Us was going to make a bid? Why or why not?

iv. What guidance can you get from any relevant published professional ethics codes?

4. Cybermedicine is a very complicated area of e-commerce. It poses some very difficult legal issues as two industries interface over the Internet. Discuss and substantiate your understanding of the issues currently being faced by cyber medicine providers. What are the major concerns?

Reference no: EM131472015

Questions Cloud

How can hammond end the dispute : Phyllis Hammond was living in Taromina, a 92-unit oceanfront cooperative in Florida, when its HOA ended its ban on cats. Hammond scurried out and bought.
How can you use future-focused thinking to increase success : How can you use future-focused thinking to increase your success trajectories at home, and at work? How will you use future-focused thinking in your career?
Example call to the c code function : You should provide both your C code and an example call to the C code function. Be sure to provide an overview of what your function is doing.
What decision should the judge make : Janice Turner was angry that her neighbor's Strawberry Blush cling peach tree was overhanging the fence. She said nothing to her neighbor, Baylor Scott.
Relevant published professional ethics codes : What guidance can you get from any relevant published professional ethics codes?
Cognitive ability tests measure mental skill : Cognitive Ability Tests measure mental skills and have been found to result in disparate impact against minorities.
Discuss the role of information technology in a supply chain : MO0360 Innovation and IT in supply chains. Critically evaluate and discuss the role of information technology (IT) in a supply chain of your choice
Can you concisely describe the line the court drew : David Lowe signed a nonexclusive right to sell agreement with Einer Johnson, a real estate agent for Antrim, Piper, Wenger, Inc. (Antrim), to sell the Lowes.
Who would you blame if something went wrong : What about if you started your own company, would you consider its use? Who would you blame (or sue) if something went wrong?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Underlying array structure

Ef?ciently implement a queue class using a circular array. You may use a vector (rather than a primitive array) as the underlying array structure.

  Practice cost-benefit question zhengxi

Practice Cost-Benefit Question Zhengxi, aged 21, is considering whether or not to go to university for four years. For simplicity assume that he is paid, and pays tuition, at the beginning of each year, and that his alternative income streams are bot..

  Computation of the cost-to-go function

When the discount factor γ approaches 1, computation of the cost-to-go function in Eq. (12.22) becomes longer. Why? Justify your answer.

  Main elements addressing risk management framework

The National Institute of Standards and Technology (NIST) replaced the former NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems with NIST Special Publication 800-37 Revision 1, G..

  Determining legal requirements for penetration testing

Based on this information, write a report outlining the steps you should take before beginning the penetration tests. Research applicable state and federal laws, and reference them in your report.

  What will happen when somebody transmits

Propose a mechanism by which repeaters might detect loops and shut down some ports to break the loop. Your solution is not required to work 100% of the time

  Techniques attacker use to access information on system

Recognize all potential security threats on home personal computer. Recognize some of techniques the attacker might use to access some information on system.

  Domains for a typical it infrastructure

Describe the 7 domains for a typical IT infrastructure where network security is implemented.

  Scalar positive integer inputs

Write a function called day_diff that takes four scalar positive integer inputs, month1, day1, month2, day2. These represents the birthdays of two children who were born in 2015. The function returns a positive integer scalar that is equal to the ..

  What if there are 10,000 recipients

how often do individual receivers get to report? What if there are 10,000 recipients?

  Describe the topology of the model

Use the data set churn. Normalize the numerical data, recode the categorical variables, and deal with the correlated variables.Generate a neural network model for classifying churn based on the other variables. Describe the topology of the model.

  Find out about desktop virtualisation

The management of your employer wants to find out about desktop Virtualisation and how it works. They think that there may be some advantage to the organisation from adopting some of these desktop Virtualisation technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd