Concept explainers
Ethics
Robert, a case manager, has decided to create a list on the listserv from his own Internet service at home for his various patients' illnesses. He establishes one list for each of the following chronic conditions: asthma, diabetes, and congestive heart failure (CHF). He automatically enrolls all of his patients that he has email addresses for into their appropriate list with the intention that they can share information and support among themselves, as well as making it easier for him to share information with his patients. Everything is going well for the first month of the listserv exchange. However, a virus is introduced to the lists and everyone is contaminated. This virus has damaged the patients' hard drives on their home computers and some patients' work computers have been harmed.
The patients contact Robert's employer and demand to be reimbursed for all damages to their machines and are very upset that these lists were created in the first place. Robert's employer was unaware of the lists.
Consider the following:
- What is the problem? (Clearly state the problem)
- What ethical principles would guide you in this case?
- What are the alternatives for solving this dilemma?
- What are the consequences for each alternative generated?
- In your opinion, what is the first choice from the alternatives and why?
- Does your choice take into consideration all of the persons involved and the consequences to each of them?
- If the worst-case scenario would occur based on your choice, could you live with your decision?
- Based on your choice, what is your plan of action?
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
- CS 386 Project: Overview Project Synopsis: This group project will require your group to design and implement your own enciphering algorithm. Your team's algorithm must combine the two operations, substitution and permutation/transposition, into your unique encryption algorithm. Your encryption algorithm must include multiple rounds of the two operations. You program must be able to encrypt and decrypt messages. Your team will need to give your algorithm a name that is unique to your encryption technique. Your group mayarrow_forwardIs the ‘word count’ function in many editing tools for creating documents a goodcryptographic checksum function? Why or why not?arrow_forwardFile extensions and the applications that create them are the subjects of this article. It is essential to provide examples.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education