Question

In: Operations Management

Companies may abuse or ethically misuse information systems in regard to customers and employees. Have you...

Companies may abuse or ethically misuse information systems in regard to customers and employees. Have you or someone you know experienced such abuse? If so, how was it handled? If not, how would you begin to take steps to eliminate such abuse or misuse?

Solutions

Expert Solution

This is happening at a mass level in current era where the customers information is always at risk. No one reads the user agreement fully before signing up for any schemes or even on any social media platforms. It happened with my colleague on whatsapp. His girlfriend was asking about his ex on whats app and they had elaborate discussion on the same and he showed one photograph of her on whatsapp. Now what happens on next day is completely shocking, his girlfriend gets the friend suggestion of his ex on facebook. Remember conversation they had was on whatsappa and they had no mutual friends as well. Whats app claims to have end to end encryption but that is not fully true.

He could do nothing at this level with this case but we as the users needs to take certain precautions rather than using it carelessely. Do not share personal information on social platforms especially phone no's, bank details etc.
Read offer document carefully before investing, buying anything very important. Users need to be very attentive in this current scenario to avoid this to happen. What happened with facebook currently, we all know.

If you need more information, do let me know :)


Related Solutions

In organizations today, employees often take advantage of their company’s information systems. Email abuse is increasing,...
In organizations today, employees often take advantage of their company’s information systems. Email abuse is increasing, and so is the amount of time employees spend surfing the Internet on company time. Indeed, statistics suggest that approximately 70% of the total amount of time spent surfing the Internet is company time. 1.Explore and Evaluate the ethics of using IT for personal uses at work. Should employees have some rights to use these resources? 2.When does their behavior become unethical? Some companies...
Most of you will work for companies that will no longer have pension systems and you...
Most of you will work for companies that will no longer have pension systems and you may not be able to count on having Social Security at all in retirement. Therefore, you will need to generate your own retirement income by saving a large quantity of money in a 401K or other similar retirement account over your lifetime. The mistake many people make is to wait to start saving any significant amount of money until they are in their later...
CREATING AN ERD: An organization’s customers may be individual persons or they may be companies. Each...
CREATING AN ERD: An organization’s customers may be individual persons or they may be companies. Each customer is given a customerID and has a DateJoined. Persons have a LastName, FirstName, and PersonAddress. Companies have a TradingName, TradingAddress, and PhoneNo. Customers may be service customers or purchase customers. Purchase customers have a CreditLimit stored for them. A customer may be both a service and a purchase customer. Service customers have maintenance contracts arranged for them. Each contract has a ContractNo, ContractDate,...
Most companies have both transactional and relational customers. How should companies treat transactional customers?
Most companies have both transactional and relational customers. How should companies treat transactional customers?
5.1) Define elder abuse and the possible different forms of elder abuse you may come across...
5.1) Define elder abuse and the possible different forms of elder abuse you may come across in your nursing career (in 50-70 words)
Business sensor technology provides a way for companies to learn about their customers, employees, and operations:...
Business sensor technology provides a way for companies to learn about their customers, employees, and operations: data captured from sensors can be used to improve engagement, Sales, productivity, safety, and much more. A PwC survey of Global business and IT executives found that 25% of automotive executives: 27% of energy, utilities, and mining executives, 30% of hospitality and leisure executives; 33% of industrial products executives; and 52% of retail and consumer executives say their companies are currently investing in business...
Find an article about the misuse of statistics and share what you have learned from the...
Find an article about the misuse of statistics and share what you have learned from the article. Then, find an example of when statistics were misused/skewed and state the reason why you think the statistics were reported that way.
Different companies may have or may choose to have different cost structures for the same product....
Different companies may have or may choose to have different cost structures for the same product. Many companies try to lower total cost regardless of output but, if it were so easy, then it would already have been done. So, consider a change in cost structure which combines a 10 percent increase in fixed cost and a sufficient decrease in marginal cost which does not change BE. a) How large is the required decrease in marginal cost? b) Over what...
- Do you have an opinion or suggestion for how to ethically allocate scare resources for...
- Do you have an opinion or suggestion for how to ethically allocate scare resources for Covid-19? Should there be ethical values for rationing health resources in a pandemic?
As an expert in health informatics and health information systems, you have been contacted by a...
As an expert in health informatics and health information systems, you have been contacted by a rural hospital to investigate a programming error. Due to a programming error, 19 members of a large healthcare organization received email messages containing private healthcare information about multiple other members. A root cause analysis showed that organizational issues played a significant role in this security breach. You will discuss how the Risk Analysis and Management processes described are applied to this case. In addition...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT