Question regarding the protecting personal data

Assignment Help Basic Computer Science
Reference no: EM131055195

Scenario 1: Protecting Personal Data

Your customer is a community clinic that works with families with problems of family violence. It has three sites in the same city, including a shelter for battered women and children. The director wants a computerized record and appointment system, networked for the three sites. She wants a few laptop computers on which staffers can carry records when they visit clients at home and stay in touch with clients by email. She asked about an app for staffers' smartphones by which they could access records at social service agencies. At the shelter, staffers use only first names for clients, but the records contain last names and forwarding addresses of women who have recently left. 

Scenario 2: Email System With Targeted Ads

Your company is developing a free email service that will include targeted advertising based on the content of the email messages (similar to Google's Gmail). You are part of the team designing the system. 

What are your ethical responsibilities?

Scenario 3: Webcams in School Laptops

As part of your responsibilities, you oversee the installation of software packages for large orders.

A recent order of laptops for a local school district requires webcam software to be loaded. You know that this software allows for remote activation of the webcam.

Please help to analyse this scenario according to this steps:

Identify responsibilities of the decision maker

Identify rights of stakeholders

Consider the impact of the options on the stakeholders (consequences, risks, benefits, harms, costs)

Categorise each potential action as ethically obligatory, prohibited, or acceptable

When there are multiple options, select one, considering the ethical merits of each, courtesy to others, practicality, self-interest, personal preferences, etc.

Reference no: EM131055195

Questions Cloud

Organizational risk appetite and risk assessment : Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO) of the organization has seen reports of malicious activity on the rise and has become extremely concerned wit..
What is the current yield or cost of the preferred stock : NPerpetuity, Inc. issued $1,000 par value preferred stock 20 years ago. The stock provided a 7.50 percent yield at the time of issue. The preferred stock is now selling for $1,162.79. What is the current yield or cost of the preferred stock?
Yield to maturity and call with semiannual payments : Thatcher Corporation's bonds will mature in 18 years. The bonds have a face value of $1,000 and an 8.5% coupon rate, paid semiannually. The price of the bonds is $950. The bonds are callable in 5 years at a call price of $1,050.
What is the standard deviation of the estimated returns : Expected Return, Variance, Std. Deviation and Cofficient of Variation: Magee Inc.'s manager believes that economic conditions during the next year will be strong, normal, or weak, and she thinks that the firm's returns will have the probability distr..
Question regarding the protecting personal data : Your customer is a community clinic that works with families with problems of family violence. It has three sites in the same city, including a shelter for battered women and children. The director wants a computerized record and appointment syste..
What is the bonds nominal annual yield to maturity : Quantitative Problem: Ace Products has a bond issue outstanding with 15 years remaining to maturity, a coupon rate of 7.4% with semiannual payments of $37, and a par value of $1,000. What is the bond's nominal annual yield to maturity (YTM)? What is ..
Estimate the size and number of fenders that will required : Based on the information discussed in fender design and ships characteristics, estimate the size and number of fenders that will be required for budgeting purposes. Basis for selection of vessel characteristics and fender type must be discussed to..
What should be the market price today of these bonds : Bank purchased bonds two years ago. These bonds have a par value of $300 million and a coupon rate of 4.75 percent. As of today, they have seven years until they mature. Investors today are requiring a 5 percent yield to maturity. What should be the ..
High level plan for handling contingencies : Write a 2-3 page (single spaced) high level plan for handling contingencies in a large bank with many branches in the united states. A detail plan will be much longer focus on only the high level plan and include those aspects that you think are r..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the output of this code sequence?

What is the output of this code sequence?

  Consider a variant of cbc-mode encryption

Consider a variant of CBC-mode encryption where the sender simply increments the IV by 1 each time a message is encrypted (rather than choosing IV at random each time). Show that the resulting scheme is not CPA-secure.

  Ddraw diagrams showing a conceptual view and a process view

Assume that the MHC-PMS is being developed using an object-oriented approach. Draw a use case diagram showing at least six possible use cases for this system.

  Write a multithreaded program

Make sure it is able to compile a program prog.c with pthread, do "gcc -lpthread -o prog prog.c" Need the: a) The code b) Screenshot of the terminal showing your program running with at least 8 (different) numbers as run-time input.

  Calculates a filtered output

Calculates a filtered output y[k], given by the formula y[k]=-a_2[k-1]-a_1y[k-2]-a_0y[k-3]+b_3f[k]+b_2f[k1]+b_1f[k-2]+b_0f[k-3]. The values y are outputs, k is an index into a sequence

  Specifically, for the session long project for this module

Specifically, for the Session Long Project for this Module, you are to review the Mitnick Security Consulting website [available at http://mitnicksecurity.com/]. Kevin Mitnick was for a number of years one of the most successful bad-guy hackers in th..

  Simple eigenvalue of a diagonalizable matrix

Let be a simple eigenvalue of a diagonalizable matrix with right and left eigenvectors and , and let be the corresponding eigenvalue of the matrix . Show that to first order it holds that Hint: Consider the perturbed eigenvalue equation .

  Determine probability of obtaining exactly k heads of coin

Counting heads. Given integers n and k, along with p1; : : : ; pn 2 [0; 1], you want to determine the probability of obtaining exactly k heads when n biased coins are tossed independently at random.

  Determine the value required for any prescaling

A PWM is used in 8-bit mode to produce a signal with a 1 msec period and 60% duty cycle. Determine the value required for any prescaling and the values for the period and duty cycle registers. The E-clock is 24 MHz.

  Use-case matrix for the major processes of the system

Below is a Use-Case Matrix for the major processes of the system. To keep this simple, all "maintenance" events, such as adding new salespeople, tasks, and technicians have been ignored.

  Using a truth table or equivalent determine following

Using a Truth Table or equivalent determine

  What is the purpose of a standard operating procedure

What is the purpose of a standard operating procedure (SOP) in digital forensics? You might also think of this as a systematic approach to the investigation. List five activities that should be in every SOP for digital forensics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd