817 Search Results for Ethics and the Internet as the Computer
Organizational Behavior
Significance of ethics in the process of decision making and impact of technology on work-related stress
An important aspect in studying organizational behavior is the relevance and significance of ethics in the process of d Continue Reading...
Enterprise Security Management
Security and Ethics at Cincom Systems
Cincom Systems is a global leader in the development, implementation and service of enterprise software that is specifically designed for the needs of complex manufacturers. Its s Continue Reading...
As one analyst points out: "it owns neither content nor the delivery mechanism. Though a global business, it has no geographical control anywhere in the world. Since nearly all its consumer services are free, it doesn't have the power to raise price Continue Reading...
The 2009 Annual Report for instance argues that the company was "in compliance with the only financial covenant in both credit agreements, which requires us to maintain a coverage ratio of at least three times earnings before interest, taxes, deprec Continue Reading...
It is common for enterprise-level customers to get an 800 number and be asked to bring their systems into a store for support. When a corporation has literally thousands of them this is clearly not feasible, and it has only been recently that Apple Continue Reading...
The balance of egalitarian and utilitarian-based ethics vs. The balkanization of groups, resources, and standards is the focus of the public choice theory (Meijer, Homburg, 2009).
Using the Internet and open source as an example, the authors illust Continue Reading...
Society's Overdependence On Computers
Today, the human race has become dependent almost entirely on computers for everything from communication to research to classroom instruction. Indeed, it would be hard to imagine of a world without computers. T Continue Reading...
Apple Computer Company's history. 3 reliable sources required
The history of the Apple Corporation: The legacy of Steve Jobs
The history of Apple begins with the persona of a single figure: Steve Jobs. In 1976, Jobs, a college drop-out, and friend Continue Reading...
Internet has grown exponentially since its first introduction to the public. The precursor to the Internet was the ARPANET. The Advanced Research Projects Agency (ARPA) of the Department of Defense (Carlitz and Zinga, 1997) and the National Science Continue Reading...
Empower Digital Trust: Crafting an Ethical Framework for FacebookIntroductionIn today\\\'s digitally interconnected world, where every action and interaction leaves a digital footprint, the ethical landscape is not just a mere accessory but a corners Continue Reading...
private) activities created an unlimited power of moral and ethical censorship that transcended all boundaries (p 258)."
Human Rights Watch (2008). Human Rights Watch World Report 2008. Human Rights
Watch, New York, NY.
This report will contribut Continue Reading...
It is seldom possible to draw a sharp line of distinction between what's wrong and what's right. Everybody has their own distinctive view with regard to the major moral challenges linked to internet privacy, right from social media privacy to Continue Reading...
These include collaborative platforms including Facebook private pages, Wikis and enterprise content management (ECM) portals used for managing content so it is available on a 24/7 basis. Microsoft has an inherently difficult problem to solve intern Continue Reading...
Unconsented Facebook Behavioral User Research
Facebook's 2012 involvement in a behavioral experiment on a series of its unknowing users
Case Presentation
There is much controversy with regard to Facebook's role in a scandal involving users being Continue Reading...
Ethical Issues in Computer Security
The ubiquity of information systems, more particularly those that are internetworked, has provided for better personal lives and enabled business to operate more efficiently and effectively ever than before. Cong Continue Reading...
Cyber Ethics, Morality, and Law
Annotated Bibliography
A lot security and privacy issues have attracted the attention of many individuals with the coming internet communication and cyber-wars. World leaders caution that the cyber threat to the cou Continue Reading...
Business Ethics
Company Overview
Ethics and Code of Conduct
Guiding Principles
Our Ideology;
Our Objectives;
Our Core Values that shape us;
As a part of my Business Ethics lesson I have a task to criticize and improve my company's code of ethi Continue Reading...
ethics of business regarding computer technology. The writer focuses on the issue of email privacy and whether employers have the right to read and act on private email sent by employees from their workstations. The writer explores both sides of the Continue Reading...
Ethical Principles in Research
While experimenting and during the research of several diverse subjects ranging from animal testing to human experimentation, from social and scientific transgression to scientific research, there are ethical principle Continue Reading...
Ethics, Social Justice & Advocacy Dimensions
Cultural diversity case study: Biko
Biko has overcome tremendous obstacles to attain his current level of educational and social achievement. However, this inevitably has caused him a great deal of Continue Reading...
Law Enforcement and Computer-Based Crime
Before beginning any discussion regarding the consequences of employee monitoring, it is crucial to first develop a working knowledge of precisely what this blanket term actually entails. Simply put, employee Continue Reading...
Introduction
Digital Disease Detection, commonly referred to as digital epidemiology provided strategies and methods for allowing digital-technology users to monitor infectious disease and conduct surveillance. These strategies help in the understan Continue Reading...
Adult Education and the Internet
Higher Education, the Internet, and the Adult Learner
The concept of using the Internet in the pursuit of higher education is not exactly new. Indeed, the institution of "distance learning," has been in full swing s Continue Reading...
"
However surprisingly, there have been arguments for pornography and have stated that it encourages experimentation with new media and any act to censor it would go against the First Amendment which has not only intellectual, moral, political, and Continue Reading...
Business Ethics
How important is an individual's privacy in the workplace? Is an individual's privacy in the workplace the most important consideration to be taken into account? What constitutes privacy in a workplace environment? Do the goals and t Continue Reading...
Criminal Justice
Computers and Their Effects upon Police Efficiency
Computer technology has transformed the modern day police department. Numerous systems now provide assistance in fields ranging from communication, to information storage and retri Continue Reading...
" (Cole and Styron, nd)
Cole and Styron report that with the additional technology available in today's schools it would be natural to believe that students would enter the workforce better prepared for use of technology than previously. This is sta Continue Reading...
Aviation Business Ethics and Sept. 11 Industry Implications
On September 11, 2001, nineteen terrorists passed through several security checkpoints at three United States airports and proceeded to hijack four commercial jets. The horror began at 8:45 Continue Reading...
strong work ethic is vital to the success of any firm. In recent years thee have been many comparisons made between the work ethic of American and Japanese employees. (Rhody 1995) The purpose of this discussion is to compare and contrast Japan's man Continue Reading...
Organizational Approaches to Managing Ethics
Information Systems
Managing ethics in the workplace is a moral necessity as well as a practical one. Without formal management of ethics in the work environment, an organization puts itself on the path Continue Reading...
2. Is it ethical to send an attractive employee to a bar to "hang out" with a competitive employee in the hopes of getting information? Again, this is quite dependent upon the situation. If one "assigns" the attractive employee to participate in es Continue Reading...
Quite to the point, television, film, pop music and video games share in common a proclivity to promote that which yields prosperity. Thus, there is little regard from the computer gaming industry for indications that "a meta-analytic review of the Continue Reading...
S.$36 million) for immediate expenditures; and redefining "priority sector" expenditures to include spending on security.
For its part, the World Bank responded to Chad's renegging on its ageements in 2006 by suspending disbursement of $124 million Continue Reading...
So far, there are few signs of them reinvesting these profits in infrastructure that would help alleviate the problem, such as more refineries in the U.S. that could create more fuels and help bring prices down. The organizational leadership at this Continue Reading...
INTERNET-BASED MANUFACTURING SYSTEM.
Design internet-based manufacturing system for the oversea small manufacturing companies
Global competitions and rapid changes in the customers' requirements are forcing the manufacturing companies to adopt the Continue Reading...
Social Networks and Computer Ethics
For the past 20 years, there have been many changes caused by the internet on many aspects of the contemporary life. The internet is growing rapidly. As of 2006, it was recorded that the number of internet users w Continue Reading...
Privacy in the Workplace
"Employee Monitoring: Is there Privacy in the Workplace?" 2003. Consumers Action Network
Professionally ethical standards dictate that employees should be committed to working and performing at a professional level while in Continue Reading...
The firm theoretically encourages individual social responsibility on the part of its employees by encouraging political action, but without requiring a particular ideological point-of-view to be supported. As a company, Microsoft is socially respo Continue Reading...
Cyber Feminism, Gender and Technology
Cyberfeminism, Gender and Technology
Feminist movement found on the internet is known as Cyberfeminism. In recent times, the term has gained controversial status. Cyberfeminism, a fundamental issue from the fem Continue Reading...
Technology and Ethics
Companies and corporations around the globe are utilizing ever-expanding technology to help set and manage ethical standards and guidelines within the workplace. Additionally, utilizing such technology can help to shape the typ Continue Reading...