Experiencing MIS
Experiencing MIS
8th Edition
ISBN: 9780134792736
Author: KROENKE
Publisher: PEARSON
Expert Solution & Answer
Book Icon
Chapter 4, Problem 1EGDQ

a)

Explanation of Solution

“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to categorical imperative.

Reason:

Categorical imperative is that in all situations the complete requirements must be followed and it should be acceptable as an end in it.

  • According to categorical imperative, creating the free app is ethical in all situations because it contains the complete requirements which are acceptable.
  • It is a law which is unconditional for each and every agent.

b)

Explanation of Solution

“Yes”, the decision to develop the free app for harvesting the individual data is ethical according to utilitarian perspective.

Reason:

Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility.

  • According to utilitarian perspective, creating the free app is ethical as it reducing the illegal harvesting the individual data by improving the legal harvesting the individual data.
  • This is benefitting both developer and users.
  • In such cases, there is a risk of hampering the privacy of the users but it is considered as ethical as long as it is transparent.

c)

Explanation of Solution

Reaction of the user to harvest the data to free app:

The user reaction at the time of the harvest the data while exchange of free app comes under in two cases; they are as follows:

  • Some user may think it as optimist way, that is, user must share the data which is necessary to free app. Then only user can access the app with free of cost.
  • Some user may think it as pessimist way, that is, user takes it as negative way that personal data can be shared

Want to see more full solutions like this?

Subscribe now to access step-by-step solutions to millions of textbook problems written by subject matter experts!
Students have asked these similar questions
(e) Based on the type of hacker you select, explain whether a hacker should be legally prosecuted in they break into a device and review or perhaps revise or destroy the data in the device. (f) If you feel the hacker is doing something of benefit, explain your thoughts. (g) Every person in the class must present their own unique situation regarding ergonomics so there should be no duplicates from anyone in the class when they present their Discussion entry.
Is it OK, in your view, to give up a negligible amount of personal information in exchange for free or almost free software? Is there a way to make them responsible for the data that they gather and how they utilise it, and is this technique even possible? Always be prepared to provide an argument in support of your stance. Your assertion has to be backed up by some kind of proof.
For this assignment you are to find 3 real-world examples of identity theft, preferably medical id theft, but any type will be accepted. One of the examples should be your own if you were an id theft victim (I personally have been a financial id theft victim twice) or someone you know. This will allow you to know the details of how the theft occurred and how it was handled. One of the examples must come from research news stories and other resources found on the Web. Provide a link to each website in your report.. The final example may be personal or a news story. For each case, identify the type of ID theft that occurred, and answer these questions: what did the thief do (if known) to acquire the information, how was it discovered, what were the damages incurred, how long did it take to resolve the problems caused by the id theft?.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education