Locate Two Computer Use Provide Explantation And

Locate Two Computer Use Provide Explantation And

Read through the case study regarding “The Ethics of Using Hacked Data: Patreon’s Data Hack and Academic Data Standards” (opens in new window).

Discuss the following questions:

1. Does the illegal nature of the data collection and the release of private data taint the data in the release that was already publicly available?

2. Researchers will nearly always claim that their research will have a net public benefit and thus their methods are justified. Who gets to decide if that is accurate in any given case?

3. Based on your knowledge/research, are they any other areas where businesses have gained from the use of hacked data and what do you do to save your data?

2.

Information ethics govern the ethical and moral issues arising from the development and use of information technologies, as well as the creation, collection, duplication, distribution, and processing of information itself (with or without the aid of computer technologies). Ethical dilemmas in this area usually arise not as simple, clear-cut situations but as clashes between competing goals, responsibilities, and loyalties. Inevitably, there will be more than one socially acceptable or “correct” decision. For this reason, acting ethically and legally are not always the same.

Complete the following:

  1. Research the Internet and locate two computer use policies for any business/organization (or a link to a computer use policy). NOTE: Many businesses choose to place their computer use policies on internal networks (intranets) rather than open to the public. Many places will have it directly on their websites.
  2. Compare and contrast the policies by considering the following questions:
    1. Is one more in-depth than the other?
    2. Do either leave the door open for abuse?
    3. Is the policy clearly defined?
  3. Research the Internet for lawsuits based on offensive email and post an article about the lawsuit.
  4. Answer this question: Could the lawsuit have been prevented through the implementation of an ethical computer use policy?3.

3.

Read through the case study regarding “The Ethics of Using Hacked Data: Patreon’s Data Hack and Academic Data Standards” (opens in new window).

Discuss the following questions:

1. Does the illegal nature of the data collection and the release of private data taint the data in the release that was already publicly available?

2. Researchers will nearly always claim that their research will have a net public benefit and thus their methods are justified. Who gets to decide if that is accurate in any given case?

3. Based on your knowledge/research, are they any other areas where businesses have gained from the use of hacked data and what do you do to save your data?

4.

discusses sustainable technologies and the technology infrastructure of businesses. It also touches on disaster recovery and business continuity planning as well as the characteristics of an agile MIS infrastructure. Think about the seven abilities of an agile infrastructure (page 183- figure 5.2) for this discussion- specifically think about reliability and scalability.

The attached spreadsheet contains information for possible business clients. For this discussion:

  1. Analyze the data and discuss its reliability. Be sure to highlight issues you found with the data and potential causes of the issues.
  2. What solutions do you recommend to make the data more reliable?

Module 5 Info (Excel file)