Problem regarding the posting personal information

Assignment Help Business Management
Reference no: EM131086238

Colleges and universities continue to work to help students understand that what they post on the Web is not private information and can often have unintended consequences. The following examples resulted in student disciplinary proceedings.:

1. Students at the University of Mississippi stated on an open site that they wanted to have sex with a professor

2. A student at Fisher College threatened to take step to silence a campus police officer.

Another problem with the open sites is that the students are posting personal information with which stalkers and others can access them. These nefarious individuals can then easily obtain students cell phone numbers, addresses, where about and other information. The most popular college site, Facebook indicates that students spend an average of 17 minutes a day on the site. A great deal of information can be conveyed during that time period. Students do so without thinking through the possibility that outsiders with bad intentions could be seeking and using information about them that is posted here.

What legal and ethical issues do you see in the types of comments that students make in these sites and in the sites themselves? Why and how can colleges and universities obtain information from these sites without a warrant?

Reference no: EM131086238

Questions Cloud

How does williams use music to accompany on-screen events : Briefly explain John Williams's approach to composing film music for The Empire Strikes Back. How does Williams use music to accompany the on-screen events? Compare The two scores "Yoda" and "Force." Do you think these musical examples are effecti..
Design a customer evaluation policy : Customers are the key to success of any business. However, it is essential that customer must be evaluated if business has to profitably run. Design a Customer Evaluation Policy to ensure that customer selection is made in controlled environment.
When might it be appropriate to avoid conflict : When might it be appropriate to avoid conflict?
Write a script that creates and calls a stored procedure : Write a script that creates and calls a stored procedure named spInsertCategory.
Problem regarding the posting personal information : Another problem with the open sites is that the students are posting personal information with which stalkers and others can access them. These nefarious individuals can then easily obtain students cell phone numbers, addresses, where about and ot..
Develop intellectual property violation reporting procedures : Develop intellectual property violation reporting procedures.
Exclusive right to control her own wedding photos : Bostwick emailed Oth to remove the photos from the Web site. Ohh failed to do so and Bostwick sued, clamming that she had the sole and exclusive right to control her own wedding photos. Is she correct?
Define incrementalism : Define incrementalism. Indicate how this is a positive policy approach to healthcare. How can this apply to consumer-driven healthcare?
Describe the categories into which you would divide : Describe the skills or knowledge a project manager would need to work on a project in each ofyour categories.

Reviews

Write a Review

 

Business Management Questions & Answers

  Acquisition utility or the transactional utilityshow your

acquisition utility or the transactional utilityshow your most recent decision to purchase a major item entertainment

  How ny yankees were so successful as a family owned business

Write a 1,000 word topic paper over how the NY Yankees were so successful as a family owned business.

  Delegate the duties of the contract or to discharge contract

Masterpiece argued that it had a right to delegate the duties of the contract or to discharge the contract due to commercial impracticability. Who wins.

  What are the benefits of utilizing negotiation process first

What are the benefits of utilizing the negotiation process first? How much power and authority could the WTO enact during this process?

  Organizational development and managing changethis week

organizational development and managing changethis week when you meet with your consulting partners you want to

  Maintaining and improving operationschoose an organization

maintaining and improving operationschoose an organization delivering goods andor services globally. provide a

  Maximize a linear objective function with

maximize a linear objective function with constraintsmaximize the objective function 2x 3y subject to the constraints

  Comparative examination of two firms

comparative analysis of two firms operating in two different counties, but which face similar problems or issues. Case analysis should compare and contrast and critically assess the differences in the political

  Research paper freedom of the pressfreedom of speech and

research paper freedom of the pressfreedom of speech and freedom of the press are two important rights individuals have

  Ground of failure of consideration

Pennek Motor Company now brings an action on the check that was not paid against Daye, who defends on the ground of failure of consideration. Is Pennek subject to this defense? Explain.

  Leaders as agents of social change

Leaders as agents of social change - Can you provide an analysis of the role of leaders and managers as agents of social change.

  Curtail cybercriminal activity from within a business

Explain how Internet security measures can actually create opportunities for criminals to steal, rather than prevent them. 2. What are some of the steps a company can take to curtail cybercriminal activity from within a business?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd