Were her actions ethical

Assignment Help Management Information Sys
Reference no: EM132220889

Discuss the following scenario: A student suspected and found a loophole in her university's computer security system that allowed her access to other students' records.

She told the system administrator about the loophole, but she continued to access other records until the problem was corrected two weeks later.

Were her actions ethical?

Reference no: EM132220889

Questions Cloud

Which ceo-jobs or cook-do you think developed : Which CEO-Jobs or Cook-do you think developed and executed the most effective strategic plan? What evidence can you find to support your opinion?
How do you use category strategy development in daily life : How do you use category strategy development in your daily life?
What is intellectual property : What is intellectual property? Is it offered the same protection in every country of the world? What laws currently protect it in the U.S. and Europe?
Identify marketing problem : Identify a marketing problem that you believe to be difficult or challenging. Identify the thinking obstacles that seem to make it appear difficult.
Were her actions ethical : She told the system administrator about the loophole, but she continued to access other records until the problem was corrected two weeks later.
Find industry that is noted for consumer dissatisfaction : Find an industry that is noted for consumer dissatisfaction. define concept of satisfaction first by explaining Expectancy Disconfirmation Model of Satisfaction
How should backup media be secured : There have been several incidents lately in which backup media containing personal customer information were lost or stolen.
Attempting to predict future healthcare utilization : Pam is a healthcare administration leader for large network of hospitals and health service centers that is attempting to predict future healthcare utilization
What threat does luke skywalker embody : In the Star Wars mnemonic, what threat does Luke Skywalker embody? What is the best definition of a trust boundary?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Who is your leader

What preliminary comprehensive sources have you found to support your weekly research?

  Briefly describe the tpm waterfall method

Your company has been using Traditional Project Management (TPM) methods for years, but is now looking into the possibility of adopting agile practices.

  How does implementation differ from product innovation

How does implementation differ from product innovation and process innovation? Which of the four key issues do you believe is most affected

  Switching and the spanning tree protocol

Switching and the Spanning Tree Protocol- Describe the key processes that take place when two (2) IP hosts communicate over a switched LAN. Propose at least one (1) common issue that may occur in a switched LAN environment and suggest one (1) stra..

  Ways to determine if your system was infected with a virus

The head of the IT security department expressed her concerns about series of data breaches that occurred in the company.

  How should contoso begin to address its challenges

How should Contoso begin to address its challenges with disparate systems? How can disparate systems be integrated? How much integration is practical and/or fea

  What is the relationship between supply chain management

what is the relationship between supply chain management and knowledge management and how do they both relate to

  Why did you include or exclude data from the research

What types of data were collected?How was the data analyzed? Why did you include or exclude data from the research?

  Analyze the major disadvantages and possible hazards

Analyze the major disadvantages and possible hazards that an organization should consider before adopting SSDs.

  Determine the standard deviation and variation

Determine the standard deviation and variation

  How the virtual teams would collaborate and access

Compare and contrast virtual teams and traditional teams with respect to communications, technology use, and team diversity. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality ..

  Ways national security agencies use technology to protect

how do local agencies, such as police departments, use technology to ensure security. ways national security agencies use technology to protect the public from threats

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd