Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 17, Problem 4MBD
Explanation of Solution
Importance of securing data:
- Leaked data could have serious consequences for employees and public.
- Privacy breaches leads to fines, bas press, reputation damage and loss of trust.
- The residents’ personal information should be protected.
- Breaching data protection act may lead to huge fines and it cannot protect job.
Accessing customer
- If customer database is been accessed by someone then name as well as other personal information are stolen.
- This private information could be used for fraudulent purposes.
- This information is misused to apply for credit cards, driver’s licenses and other documents.
- This may destroy credit for person and it will reflect in loan schemes of person.
- The social security numbers may reveal entire personal data of person.
- The hackers may even update information for fraudulent activities.
Changing data in customer database:
- If data in customer database is updated then it creates serious issues.
- If new data is been added to violent offenders list illegally then it affects innocent people.
- It may result in facing of legal procedures for the innocent people in customer database...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
There are always bugs in the first releases of operating systems and programs. There are literally hundreds of bugs in each application. Vendor fixes for recognized software problems are often available (also known as patches). A zero-day assault is often launched by criminals the day after a new vulnerability is made public. No one disputes the immorality of these criminals' actions, but what responsibility does a software firm have if its ineptitude or haste to market endangers its customers? Updates to security software are a must for all computer users.
Casual Observer Software’s main product is a program that monitors and analyzes user keystrokes and mouse clicks to learn more about the way employees use their computer systems. The problem is that some users feel this is an unwarranted intrusion into their privacy, and they prefer not to be observed. Some even fear that the data would be used for other reasons, including performance appraisal. You are a consultant who has been hired by a client firm that is trying to decide whether or not to use this software. Before you advise the client, go back to Chapter 4 and consider the Hawthorne Effect, which suggests that employees might behave differently when they know they are being observed. Finally, think about the ethical issues that might be involved in this situation. What will you advise your client, and why?
Casual Observer Software’s main product is a program that monitors and analyzes user keystrokes and mouse clicks to learn more about the way employees use their computer systems. The problem is that some users feel this is an unwarranted intrusion into their privacy, and they prefer not to be observed. Some even fear that the data would be used for other reasons, including performance appraisal. You are a consultant who has been hired by a client firm that is trying to decide whether or not to use this software. Before you advise the client, remember the Hawthorne effect, which suggests that employees might behave differently when they know they are being observed. Finally, think about the ethical issues that might be involved in this situation. What will you advise your client, and why?
Knowledge Booster
Similar questions
- When operating systems and most other types of software are first released, they are not completely bug-free.There are applications available that contain tens of thousands of bugs.Known flaws in published software are routinely addressed by software companies through the distribution of patches (also known as patches).Hackers and other criminals frequently launch zero-day attacks the day after a new vulnerability is publicly disclosed. No one can deny that these criminals' actions are unethical, but what duty does a software company have if their negligence or haste to market causes harm to customers? What are computer users' responsibilities in terms of staying up to date on security patches?arrow_forwardThere are a number of problems with computer security, including the fact that it is frequently viewed as an afterthought, something that will be added after the system has been built rather than as an integral part of the design process. A short explanation of the consequences of security should be given if it is a last-minute consideration.arrow_forwardOperating systems and most other types of software aren't completely bug-free when they're initially launched. There are applications out there that have tens of thousands of issues, which are referred to as bugs. Known problems with published software are routinely corrected by software firms via the provision of fixes (also known as patches). The day after a new vulnerability is publicly disclosed, hackers and other criminals often launch zero-day assaults to exploit it. No one can deny that these criminals' actions are unethical, but in the event that their negligence or haste to market causes harm to customers, what duty does a software firm have? What responsibilities do computer users have in terms of staying up to date on security patches?arrow_forward
- What are the main security concerns in software development, and how can they be mitigated?arrow_forwardNeither the operating system nor the majority of applications are released without some sort of initial hiccup. Tens of thousands of bugs have been found in popular applications. Vendors of software frequently release updates that fix previously discovered bugs. On the second day following the disclosure of a new vulnerability, cybercriminals launch zero-day attacks. No one can argue against the immorality of these criminals' actions, but what responsibility does a software firm have if its incompetence or haste to market causes harm to its customers? Users also have a responsibility to install any necessary security patches on their computers.arrow_forwardComputer security is one of the issues since it is often introduced after the fact rather than being a part of the design process. Mention security briefly if it is a secondary concern.arrow_forward
- Most hackers start their careers breaking into computer systems as teenagers. What can we as a community of computer professionals do to reduce the temptation to become a hacker? What is the difference between a white hat hacker and a black hat hacker? Is there such a thing as a gray hat hacker?arrow_forwardOne of the challenges to computer Security is that it’s often anafterthought to be incorporated into a system after the design iscomplete rather than being an integral part of the design process. Briefdiscuss the security implication if it’s an afterthought.arrow_forwardThere is a need to create a privacy policy for a paking software. A privacy policy specifies key points on how privacy and security with regards to the application , user data and system flow is achieved. It focuses on privacy and security for the software and not for other entities(i.e vehicle, parking office etc..) From a high level our parking software has the following rules The system has several parking lots and the parking fees are different for each parking lot. Customers must have registered with the parking office in order to use any parking lot. Customers can use any parking lot. Each parking transaction will incur a charge to their account. Customers can have more than one car, and they may request more than one parking permit for each car. The system provides a 20% discount to compact cars compared with SUVs. For simplicity, assume that the Parking Office sends a monthly bill to customers and customers pay it outside of the parking system. Privacy policies generally…arrow_forward
- One of the difficulties with computer security is that it is sometimes an afterthought, inserted into a system after the design is complete, rather than being an inherent part of the design process. If security is an afterthought, mention it briefly.arrow_forwardIdentify a possible security attack that has been the result of a programming fault. What was the type of attack and what was the possible programming flaw leading to a vulnerability in the program?arrow_forwardThere is a need to create a privacy policy for a parking software. A privacy policy specifies key points on how privacy and security with regards to the application , user data and system flow are achieved. It focuses on privacy and security for the software and not for other entities(i.e vehicle, parking office etc..) From a high level our parking software has the following rules The system has several parking lots and the parking fees are different for each parking lot. Customers must have registered with the parking office in order to use any parking lot. Customers can use any parking lot. Each parking transaction will incur a charge to their account. Customers can have more than one car, and they may request more than one parking permit for each car. The system provides a 20% discount to compact cars compared with SUVs. For simplicity, assume that the Parking Office sends a monthly bill to customers and customers pay it outside of the parking system. Based on the information…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education