Computer Science An Overview Ap Edition
13th Edition
ISBN: 9780134891729
Author: J. Glenn Brookshear, Dennis Brylow
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 9, Problem 4SI
Explanation of Solution
Selling the purchasing patterns of clients to a marketing company:
If a credit card company sells the purchasing patterns of its clients to a marketing company, it may or may not be beneficial for the client depending on the conditions described below:
- The marketing company should have a proper security system to avoid any information breach.
- The credit card company should ensure that marketing company is trustworthy and would not sell data to another company.
- The purchase pattern should only be used for marketing purpose only.
- The credit card company should ask its customer before sharing purchase pattern information with marketing company.
- The customer should be benefited by this scheme. Only relevant advertisements should be shown to the customer.
Selling the mailing list to a sports car magazine:
If a sports car mail order company sells the mailing list sports car magazine, it may or may not be beneficial for the persons in mailing list depending on the conditions described below:
- The sports car magazine company should have a proper security system to avoid any information breach.
- The sports car mail order company should ensure that sports car magazine company is trustworthy and would not sell data to another company...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
To what end does using a scanner serve? Do you want to be seen as ethical or immoral? Why?
Specify the criteria that must be met in order to choose the most appropriate screening
instrument for a certain task. Is there any way to avoid being scanned? Explain.
To what end does using a scanner serve? Do you want to be seen as ethical or immoral? Why?
Specify the criteria that must be met in order to choose the most appropriate scanning instrument for a certain task. Is there any way to avoid being scanned? Explain.
oung, technically oriented hackers argued that, if the owners of a computer system want to keep outsiders out, it is their responsibility to provide better security. Ken Thompson, one of the inventors of UNIX, said, "The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor’s house. It should not matter that the neighbor’s door is unlocked." Which position do you agree with more? Give your reasons
Chapter 9 Solutions
Computer Science An Overview Ap Edition
Ch. 9.1 - Identify two departments in a manufacturing plant...Ch. 9.1 - Prob. 2QECh. 9.1 - Summarize the roles of the application software...Ch. 9.2 - Prob. 1QECh. 9.2 - Prob. 2QECh. 9.2 - Prob. 4QECh. 9.2 - Prob. 5QECh. 9.2 - Prob. 6QECh. 9.3 - Prob. 1QECh. 9.3 - What is a persistent object?
Ch. 9.3 - Identify some classes as well as some of their...Ch. 9.3 - Prob. 4QECh. 9.4 - Prob. 1QECh. 9.4 - Prob. 2QECh. 9.4 - Prob. 3QECh. 9.4 - Prob. 4QECh. 9.4 - Prob. 5QECh. 9.4 - Prob. 6QECh. 9.5 - Prob. 1QECh. 9.5 - Prob. 2QECh. 9.5 - Prob. 3QECh. 9.5 - Prob. 4QECh. 9.5 - Prob. 5QECh. 9.5 - Prob. 6QECh. 9.5 - Prob. 7QECh. 9.6 - Prob. 1QECh. 9.6 - Give an additional example of a pattern that might...Ch. 9.6 - Prob. 3QECh. 9.6 - How does data mining differ from traditional...Ch. 9.7 - Prob. 1QECh. 9.7 - Prob. 2QECh. 9.7 - Prob. 3QECh. 9.7 - Prob. 4QECh. 9 - Prob. 1CRPCh. 9 - Prob. 2CRPCh. 9 - Prob. 3CRPCh. 9 - Prob. 4CRPCh. 9 - Prob. 5CRPCh. 9 - Prob. 6CRPCh. 9 - Prob. 7CRPCh. 9 - Prob. 8CRPCh. 9 - Prob. 9CRPCh. 9 - Prob. 10CRPCh. 9 - Prob. 11CRPCh. 9 - Prob. 12CRPCh. 9 - Using the commands SELECT, PROJECT, and JOIN,...Ch. 9 - Answer Problem 13 using SQL. PROBLEM 13 13. Using...Ch. 9 - Prob. 15CRPCh. 9 - Prob. 16CRPCh. 9 - Prob. 17CRPCh. 9 - Prob. 18CRPCh. 9 - Prob. 19CRPCh. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Empl Id Name Address SSN Job Id Job Title Skill...Ch. 9 - Prob. 22CRPCh. 9 - Prob. 23CRPCh. 9 - Prob. 24CRPCh. 9 - Prob. 25CRPCh. 9 - Write a sequence of instructions (using the...Ch. 9 - Prob. 27CRPCh. 9 - Prob. 28CRPCh. 9 - Prob. 29CRPCh. 9 - Prob. 30CRPCh. 9 - Prob. 31CRPCh. 9 - Prob. 32CRPCh. 9 - Prob. 33CRPCh. 9 - Prob. 34CRPCh. 9 - Prob. 35CRPCh. 9 - Prob. 36CRPCh. 9 - Prob. 37CRPCh. 9 - Prob. 38CRPCh. 9 - Prob. 39CRPCh. 9 - Prob. 40CRPCh. 9 - Prob. 41CRPCh. 9 - Prob. 42CRPCh. 9 - Prob. 43CRPCh. 9 - Prob. 44CRPCh. 9 - Prob. 45CRPCh. 9 - Prob. 46CRPCh. 9 - Prob. 47CRPCh. 9 - Prob. 48CRPCh. 9 - Prob. 49CRPCh. 9 - Prob. 50CRPCh. 9 - Prob. 51CRPCh. 9 - Prob. 52CRPCh. 9 - Prob. 53CRPCh. 9 - Prob. 54CRPCh. 9 - Prob. 55CRPCh. 9 - Prob. 56CRPCh. 9 - Prob. 57CRPCh. 9 - Prob. 58CRPCh. 9 - Prob. 59CRPCh. 9 - Prob. 60CRPCh. 9 - Prob. 61CRPCh. 9 - Prob. 62CRPCh. 9 - Prob. 1SICh. 9 - Prob. 2SICh. 9 - Prob. 3SICh. 9 - Prob. 4SICh. 9 - Prob. 5SICh. 9 - Prob. 6SICh. 9 - Prob. 7SICh. 9 - Prob. 8SICh. 9 - Prob. 9SICh. 9 - Prob. 10SI
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- "Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning Please: Don't use Chatgptarrow_forwardDevelop, with the use of encryption, a system for the protection of the records kept at the hospital.arrow_forwardIn your opinion, where does an organization's information security begin and end? In other words, when does a company's security policy and measure take effect, and when does it stop taking effect? Do you believe that any of these limits might be extended in the future? If this is the case, explain how and why. If not, what would be the reason?arrow_forward
- Do you agree that it's reasonable to provide a username and email address in exchange for free or almost free software? Is there a way to make sure they're accountable for the data they acquire and how they utilise it? Be prepared to defend your stance at any time. Your claim must be backed up with proof.arrow_forwardIs it feasible to come up with at least six new suggestions for the safety of the financial system in the shortest period of time?arrow_forwardneed correct answer plzarrow_forward
- When does information security begin and end for a business? When do security procedures and rules start taking effect, and when do they end? Is it possible, in your opinion, to increase these bounds?arrow_forwardThe term "responsibility" refers to the act of determining whether or not a person is responsible for his or her own actions. Which of the following is the most secure option? It is critical that you provide an explanation for your behavior.arrow_forwardWith proper explanation else skip Proper explanation got thumbs-uparrow_forward
- Can you think of an example of online bullying or harassment that you witnessed? How did you react when you first heard about the situation? After all, you didn't know the person had been bullied until after you intervened.arrow_forwardAppropriate caution? What are the benefits to a business of functioning cautiously?arrow_forwardCan you please help me find an applicable law/s for these three commandments, the specific violation identified, and a Remark (including specific penalties). Below is an example. The law/s should be from the Philippines Here is the table I should fill out: Computer Ethics commandment Applicable Laws Specific Violation Identified Remark 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,