Provide the steps involved in ethical analysis, Database Management System

Assignment Help:

Question :

Mr. Smith Harry has a car manufacturing company which has recently integrated management information system. He wishes to obtain more information on ethics and social issues related to management information system.

(a) What do you understand by the term ethics and privacy?

(b) Explain to Mr. Harry Smith, what are the key technology trends that are giving rise to ethical issues.

(c) The following terms are the basic concepts for ethical analysis. Define these terms :

(i) Responsibility
(ii) Accountability
(iii) Liability
(iv) Due process

(d) Provide the FIVE steps involved in ethical analysis.

(e) One challenge that Mr. Harry will face is the protection of Intellectual Property. Briefly describe TWO ways of protecting intellectual property.

(f) List TWO health risks which Mr. Harry is bound to encounter with his employees with the excessive use of computer and communication technologies.


Related Discussions:- Provide the steps involved in ethical analysis

The second normal form (2nf), The Second Normal Form (2NF) Definition: ...

The Second Normal Form (2NF) Definition: A relation is in 2NF if it is in 1NF and each non-key attribute is fully dependent on each candidate key of the relation. Some of th

What is the use of sub queries, What is the use of sub queries? A sub q...

What is the use of sub queries? A sub query is a select-from-where expression that is nested with in another query. A common use of sub queries is to do tests for set membershi

Create database and define relationships between tables, Instructions: ...

Instructions: Follow the instructions below for completing this project: 1. Creating the Database: · Use the physical table descriptions given below to define and create each t

Define network dbms, Define Network DBMS The NDBMS is built primarily o...

Define Network DBMS The NDBMS is built primarily on a one-to-many relationship, but where a parent-child representation between the data items cannot be ensured. This may occur

List any eight applications of dbms, List any eight applications of DBMS. ...

List any eight applications of DBMS. a) Universities b) Airlines c) Banking d) Credit card transactions e) Tele communication f) Sales g)Finance h) Manufac

Mis, explain various steps uses in evaluation and maintenance of MIS.

explain various steps uses in evaluation and maintenance of MIS.

Database integrity and database security, Question : (a) Differentiate ...

Question : (a) Differentiate between database integrity and database security (b) Database security involves measures to avoid loss of privacy and loss of confidentiality. D

What is nested trigger, What is Nested Trigger? A trigger can also havi...

What is Nested Trigger? A trigger can also having INSERT, UPDATE and DELETE logic within itself, so when the trigger is fired because of data modification it can also cause ano

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd