Question

In: Computer Science

Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues...

Kevin is accused by his employer of unauthorized access to a company computer. The employer pursues this as a private action. Which of the following are true about this dispute? Select all that apply.

A. Based on a shared relationship, like employer and employee

B. Requires evidence admissible in court

c. May require a third party to resolve the issue, like a mediator, judge, and/or jury D. May be resolved informally between the perpetrator and victim, or their legal representatives

d. The perpetrator is charged with breaking a law.

e.May be resolved informally between the perpetrator and victim, or their legal representatives

Solutions

Expert Solution

Option (b) and (c) are the correct answers.

The following statements are true about the dispute mentioned in the question:

Requires evidence admissible in court as nothing has been proven yet.

May require a third party to resolve the issue, like a mediator, judge and / or jury to address the scenario.

Option (a) is incorrect as Kevin is an employee of that organization and he was not authorized to access that computer, which his employer could. So, this is not a shared relationship.

Option (d) is incorrect as this is not breaking of any law. Kevin has accessed a computer which he should not. This is not a case of trespassing as he works in that office and he has not stolen the computer which is a business property belongs to the organization.

Option (e) is incorrect as this problem is between the company (access policies) and an employee of that company. This problem can't be resolved informally / internally as the company should follow the ethical policies.

Please comment in case of any doubt.
Please upvote if this helps.


Related Solutions

1- Is there such a thing as an ethical reason for unauthorized access to a computer...
1- Is there such a thing as an ethical reason for unauthorized access to a computer system? 2- One way to secure a network from attack is by blocking all incoming traffic. But is such a measure practical? Imagine running a network in different types of organizations (a bank, a university, and others). Would this be the ideal way to protect the organization's network from attack? Why or why not?
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference...
QUESTION 1 How does a firewall protect a computer network from unauthorized access? Discuss the difference between types of firewalls.
Kevin is single. In 2017, he earned $65,000 in salary this year from his employer and received $10,000 in alimony from his ex-wife.
Kevin is single. In 2017, he earned $65,000 in salary this year from his employer and received $10,000 in alimony from his ex-wife. His employer withheld $9,000 in tax from his salary this year. In addition to the above, the following occurred this year:- He decided he did not like his nose. So he paid $2,000 in cosmetic surgery to make it larger and more defined.- He paid $2,500 in union dues and for subscriptions to publications related to his...
Provide one example of a company that pursues a niche differentiation strategy and one that pursues...
Provide one example of a company that pursues a niche differentiation strategy and one that pursues a broad cost-leadership strategy. Explain
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about...
Is it acceptable for the U.S. government to support unauthorized network access to obtain information about other countries including terrorist activities?
What is the difference between logical access to the computer and physical access to the computer?...
What is the difference between logical access to the computer and physical access to the computer? Why is the security of both important?
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which...
An attacker is attempting to gain unauthorized access to a WiR network that uses WPA2-PSK. Which of the following attack vectors would the attacker MOST likely use? Capture a three-way handshake and crack it. Capture a mobile device and crack its encryption. Create a rogue wireless access point. Capture a four-way handshake and crack it.
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the...
         21. Unauthorized Access. Ted Munice has recently been fired. He had been the payroll accountant at Texas Shipping in Galveston, Texas. The systems administrator had determined that someone had logged into the payroll system twice on December 25. A forensic investigator hired by Texas Shipping questioned Ted. Ted admitted that he had logged onto the network, but denied that he had done anything while on the network. The Company wants to take legal action against Ted and...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from...
How to gather requirements and plan to identify unauthorized access attempts and block compromised systems from accessing the network without an antivirus scan.
Financial investment ~ Kevin is looking to invest his money in a local investment company called...
Financial investment ~ Kevin is looking to invest his money in a local investment company called Robin Hood financial services. To ensure his investment is safe and has good returns, he randomly surveys people who invested with the company and asks whether they would recommend the company for investment. Of the 426 people surveyed, 270 recommend Robin Hood financial services for investment. Using this data, Kevin wants to estimate the actual proportion of people who recommend Robin Hood financial services...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT