Explanation of Solution
Eric’s fraudulent behavior:
Eric, removing the matters on the Internet and doing illegal activities in search engine results for money is not an ethical act according to categorical imperative. If all the comments are taken off the Internet then, possibly there wouldn’t any content on the Internet. Doing illegal activities in search engine results, is not a good universal law.
Categorical Imperative: Categorical imperative signifies a complete requirement or a law that must be followed in all situations and is acceptable as an end in it.
Here, Eric’s behavior is considered to be ethical, if he is willing to publish his actions to the whole world and not few people. Hence, his behavior is not ethical.
Utilitarian perspective: Utilitarianism is nothing but a moral theory that states that the greatest act is the one that increases utility...
Want to see the full answer?
Check out a sample textbook solutionChapter 7 Solutions
Using MIS (10th Edition)
- 1. The estimates of losses annually due to computer fraud vary widely. Why do you think obtaining a good estimate of this figure is difficult? 2. Explain at least three forms of computer fraud.arrow_forwardWhy is it important to maintain confidentiality while doing business? Which forms of mistreatment are most likely to occur in the absence of any preventative measures? In what ways may unlawful acts be prevented if privacy standards were strictly followed?arrow_forwardWhen does the responsibility for protecting a company's data begin and end? When do security policies and procedures begin to have an effect in a given company, and when do they end? Is it possible, in your opinion, to increase these bounds?arrow_forward
- Why do you think cases of ransomware, personal data loss, and other forms of data theft continue on the rise?arrow_forwardWhy is company information confidentially important? What types of mistreatment come to mind in the absence of confidentiality controls? What illicit acts may be curtailed or stopped if confidentiality rules were properly put into place?arrow_forwardWhy should information about a company be kept under wraps? Where would we be if there were no protections in place to prevent breaches of privacy? Which types of criminal activity would be lessened or perhaps eliminated if safeguards to protect confidentiality were put into place?arrow_forward
- 4. Do you think it was ethical for authorities to use one of the high-ranking members to trap other gang members? Why or why not?arrow_forwardWhy Should a Company Keep Their Records Private? Imagine the dangers if there weren't any safeguards against leaks of private information. Which crimes may be reduced or eradicated if confidential information was protected?arrow_forwardIn light of this information, what, if any, inferences can we draw regarding criminal activity online?arrow_forward
- How should a corporation handle a security breach?arrow_forwardI When does information security begin and end for a company? What are the earliest and latest moments at which security procedures and policies of a company engage? Do you believe these restrictions may be widened?arrow_forwardIs it possible that the recent security incident involving access control or authentication that made news was the product of an inside job, according to your opinion? In what ways did it have an impact on the day-to-day operations of the company? What kind of financial losses did the firm suffer?arrow_forward
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,