Question

In: Computer Science

When people use interactive programs on the Web, do you feel it is appropriate to track...

When people use interactive programs on the Web, do you feel it is appropriate to track which buttons they select or to record the data they enter? When is it appropriate, and when is it not? Does it matter how long the data is stored? Does it matter if a profit is made from using the data?

Solutions

Expert Solution

Answer)

The most important ethical issue with regards to recording the data or conducting any research on the data is while there is informed consent along with respecting the anonymity or confidentiality and respecting the privacy.

These are considered important while one is adhering to some of the ethical norms of the research. This is a norm for promoting the aims of any research like knowledge, avoidance of any error, or the truth.

Some of the examples to these are the prohibition against that of fabrication, for any falsification or misrepresentation of the research data, or for promoting the truth as well as error reduction.

It is appropriate when one is doing research and this should be done by the consent of the user, hence some of the companies ask the user to accept the terms and condition of their website after which the companies perform their research on the ways user use their website, the number of times they visited, what all data are being stored and etc.

It is not appropriate to save the personal details of the user like the credit card, financial information, etc.

It does matter how long the data is stored, as there are many data breaches happening currently that are creating an issue hence an organization needs to keep the data securely and safely. Also, they should look at purging the data and storing it so that it is not easily accessible to the attackers.

It matters to the organization when a profit is made with the use of data.

Please comment in case you need any other inputs.
Please share a like if you find the answer helpful.
Thank you.


Related Solutions

How do you interpret a t value? When would it be appropriate to use a t...
How do you interpret a t value? When would it be appropriate to use a t test of dependent samples? Please provide an example.
How do you feel about physical fitness in physical education programs? Should it be something we...
How do you feel about physical fitness in physical education programs? Should it be something we teach separately, or intertwined with the rest of the curriculum on sports, games and movement activities? You can write about how you approach your own fitness…do you use sports as part of your training, or do you train completely separately? If appropriate, how would you use these personal experiences with fitness training with your students/athletes when you’re a coach/PE teacher in the future?
All of these programs need IO. So you must use appropriate Visual Studio solution as the...
All of these programs need IO. So you must use appropriate Visual Studio solution as the template (windows32 has been provided in the book’s website and you supposed to know how to use it as it was required in the previous assignment) Write an assembly language program to calculate the following. (((((20 + 21) × 22) + 23)×24)+25 : : :) + 2n Hint: Note that when n is even, carrying result is multiplied by 2n. When n is odd,...
What language activities do you feel would be especially helpful or enjoyable to use when interacting with preschool children?
What language activities do you feel would be especially helpful or enjoyable to use when interacting with preschool children? Describe at least two activities that would promote language in preschool children.
Assignment Overview This assignment will give you practice with interactive programs and if/else statements. Part 1:...
Assignment Overview This assignment will give you practice with interactive programs and if/else statements. Part 1: User name Generator Write a program that prompts for and reads the user’s first and last name (separately). Then print a string composed of the first letter of the user’s first name, followed by the first five characters of the user’s last name, followed by a random number in the range 10 to 99. Assume that the last name is at least five letters...
Research a web-based, interactive ES or a DSS that might interest you. Summarize your findings and...
Research a web-based, interactive ES or a DSS that might interest you. Summarize your findings and describe how the system worked and how you interacted with it Examine and contrast the differences between off-the-shelf packaged software, and custom software. When is one approach better or worse than the other Describe how to make a successful business case, contrasting faith-, fear-, and fact-based arguments. What applications other than those mentioned in the chapter are there for RFID tags? What must happen...
People feel better when they think they are getting a great bargain when they shop. Knowing...
People feel better when they think they are getting a great bargain when they shop. Knowing this, some retailer’s markup items above the traditional retail price and then offer a 60 percent discount. If they had simply discounted the normal retail price by 20 percent, the resulting “sale price” would have been the same. One retailer says that he is just making shoppers happy that they got a great deal when he inflates the retail price before discounting. Significantly marking...
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you...
When you put a Servlet in a Web Application on the Tomcat/Glassfish server, how do you go about running this Servlet? a. From the Browser’s URL(give path):
Computers and programs use double floats when they need?
Computers and programs use double floats when they need?
When configuring a web server, you notice the following Cipher Suites are available to use for...
When configuring a web server, you notice the following Cipher Suites are available to use for TLS-based connections: • Cipher Suite 1: TLS_ECDHE_RSA_AES_128_CBC_SHA256 • Cipher Suite 2: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA Answer the following questions regarding these two cipher suites. (10 marks total) i. What is the key exchange (Kx) algorithm in Cipher Suite 2? (1 mark) ii. What is the authentication (Au) algorithm in Cipher Suite 1? (1 mark) iii. What is the key size of the symmetric cipher in Cipher Suite...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT