Premium Essay

Chapter 4:Case: the Dangers of Using Text Messages

In:

Submitted By fenixx1
Words 1358
Pages 6
Chapter 4
Case: the dangers of using text messages
Case Questions
1. Which of the five moral dimensions of the information systems identified in this text are involved in this case? Rights and obligations are involved since the person must know the proper use of the phone and be aware of the problems it can cause and be caused by not making a proper use of the phone.

Also the quality of life since it covers all general aspects of life into which the values and ethics and social responsibility assumed by the person using the phone inappropriately is very high.
Two . What are the ethical , social and political generated by this case?
Ethics . - Because the individual in this case the driver used irresponsibly communication system while driving.
Social . - It is understood that while driving and cause accidents with third cause a problem to society for all the impact it generates.

Political . - Because in some U.S. states prohibit the use of cell phones while driving but in other states do not .

Three . What ethical principles described in the text are useful for making decisions about the use of text messages while driving ?
The responsibility , to enforce our obligations as citizens and thus ensure our security and therefore the security of others. If all motorists take the wrong decision to send messages would be many accidents and casualties . You have to be aware that we are not the only ones on the road . As Albert Einstein said : "I fear the day when technology exceeds our humanity." - The world will only have a generation of idiots . -

My action
1. Many state and local levels call for a federal law against the use of text messages while driving. Use a search engine to explore what steps the federal government has taken to deter unused text messages while driving.
In our country we are governed by laws that sometimes seem really silly,

Similar Documents

Free Essay

ÇAlmanıN SıRları

...User Guide Contents Chapter 1. Getting Started 4 7 22 25 30 Before You Start Safety Precautions Proper Posture During Computer Use Overview Turning the Computer On and Off Chapter 2. Using the Computer 33 36 40 42 45 48 49 50 53 56 65 Chapter 1 Getting Started Keyboard Touchpad External-type CD drive (ODD, To be purchased) Multi Card Slot (Optional) Connecting an External Display Device Connecting an External Digital Device Adjusting the Volume Wired Network Wireless Network (Optional) Using the TPM Security Device (Optional) Slim Security Slot Chapter 3. Settings and Upgrade 67 68 69 71 74 75 Chapter 4. Backup/Restore 80 LCD Brightness Control Easy Settings (Optional) BIOS Setup Setting a Boot Password Changing the Boot Priority Battery Samsung Recovery Solution (Optional) Chapter 5. Appendix 92 93 95 97 110 111 112 114 Q&A Important Safety Information Replacement Parts and Accessories Regulatory Compliance Statements WEEE Symbol Information Samsung Packaging Take-Back Program Product Specifications Glossary 2 Chapter 1. Getting Started Before You Start 4 Safety Precautions 7 Proper Posture During Computer Use 22 Overview 25 Turning the Computer On and Off 30 Before You Start Before reading the User Guide, first check the following information. •• Optional items, some devices and software...

Words: 23426 - Pages: 94

Free Essay

A Document in Need

.... . . . . 7 About the Book . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Part I Initial Power up and Discovering . . . . . . . . . . . . . . . . . . 11 Chapter 1 Initial Power up and Discovering . . . . . . . . . . . . . . . . . . . . . . . 13 Safety . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Presentation of the Smart Relay Front Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . Characteristics and Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Control Keys on the Front Panel of the Smart Relay . . . . . . . . . . . . . . . . . . . . . Examples. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 17 19 20 23 Part II Functions Accessible from the Front Panel . . . . . . . . . 29 Chapter 2 Chapter 3 Chapter 4 Overview of the Functions Accessible from the Front Panel. . . . 31 Functions Accessible from the Front Panel of the Smart Relay . . . . . . . . . . . . . 31 Input/Output Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 Inputs-Outputs Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 TEXT and DISPLAY screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 PROGRAMMING Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Rules...

Words: 15155 - Pages: 61

Premium Essay

Management

...Electronic Commerce, Seventh Annual Edition 10-1 Chapter 10 Electronic Commerce Security At a Glance Instructor’s Manual Table of Contents • • • • • • • Chapter Overview Chapter Objectives Instructor Notes Quick Quizzes Discussion Questions Additional Resources Key Terms Electronic Commerce, Seventh Annual Edition 10-2 Lecture Notes Chapter Overview In this chapter, you will explore security policy issues with a focus on how they apply to electronic commerce in particular. The electronic commerce security topics in this chapter are organized to follow the transaction processing flow, beginning with the consumer and ending with the Web server (or servers) at the electronic commerce site. Each logical link in the process includes assets that must be protected to ensure security: client computers, the communication channel on which the messages travel, and the Web servers, including any other computers connected to the Web servers. Chapter Objectives In this chapter, you will learn about: • • • • • Online security issues Security for client computers Security for the communication channels between computers Security for server computers Organizations that promote computer, network, and Internet security Instructor Notes Online Security Issues Overview Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. There are two general types of security: physical and logical. Physical security includes tangible...

Words: 5468 - Pages: 22

Free Essay

General Introductio

...ACADEMIC YEAR 2011 Performance analysis of Encryption/Decryption algorithms using SimpleScalar By: MANIRIHO Malachie and NIZEYIMANA Jean-Paul Supervisor: Dr.-Ing. NIYONKURU Adronis Huye, 2011 CHAPTER ONE: GENERAL INTRODUCTION 1.1. BACKGROUND TO THE STUDY There are various security measures that can be imposed in order to secure the information stored. As more and more technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be futile because the text looks ridiculous to them. It is widely recognized that data security will...

Words: 7475 - Pages: 30

Premium Essay

Hum 111/Daily Questions

...The following set of Discussion Questions has been proposed for use in this class. In almost all cases, these will be the Discussion Questions used throughout the weeks of class. However, please make sure you read the question as posted in the Main Forum and respond appropriately. Week One Discussion Questions • What do you think is the difference between thinking and critical thinking? Why? • According to the text, good thinking is a habit. Which bad habits to you think hinder your ability to be a good thinker? Why? • What is active listening? How do you think active listening is related to critical thinking? • There are predictable stages through which every critical thinker must pass. Under what circumstances might one regress from one stage to a previous one? In your current stage of development as a critical thinker, have you progressed or regressed to this stage? • Review the following Elder and Paul articles in this week’s Electronic Reserve Readings: o “Critical Thinking: Nine Strategies for Everyday Life, Part I” o “Critical Thinking: Nine Strategies for Everyday Life, Part II” Choose one of the nine strategies. How might you apply it in your life to be a better student? Week Two Discussion Questions • Select three habits that hinder thinking from those discussed in Ch. 3 of The Art of Thinking. How have you struggled with these habits in the past? What can you do to overcome these habits and improve your thinking? • Even though...

Words: 1574 - Pages: 7

Premium Essay

Cyber Bullying

...Psychology Research Adviser: MonthlYear: Number of Pages: Dr. Amy Schlieve December 2009 29 Style Manual Used: American Psychological Association, 5th edition ABSTRACT A literature review of research pertaining to cyberbullying was completed. Findings indicate that cyberbullying is becoming more prevalent as students spend an increasing amount of time using technology that keeps them connected to people at all hours of the day. There are many different ways in which cyberbullies reach their victims, including instant messaging over the Internet, social networking web sites, text messaging and phone calls to cell phones. There are different forms of cyberbullying including, but not limited to, harassment, impersonation, and cyberstalking. It has been found that there are differences between not only the prevalence of cyberbullying between males and females but also the ways in which males and females cyberbully. Like bullying, cyberbullying is a serious problem which can cause the victim to feel inadequate and overly self-conscious, along with the possibility of committing suicide due to being cyberbullied. Two such cases are included in this paper. There are numerous ways in which schools and parents can prevent cyberbullying and ways in which they can intervene if it has occurred. iii The Graduate School University of Wisconsin Stout Menomonie, WI Acknowledgments First of all I would like to thank my parents for always...

Words: 7448 - Pages: 30

Free Essay

Bully

...Dr. Amy Schlieve MonthlY ear: December 2009 Number of Pages: 29 Style Manual Used: American Psychological Association, 5 th edition ABSTRACT A literature review of research pertaining to cyberbullying was completed. ii Findings indicate that cyberbullying is becoming more prevalent as students spend an increasing amount of time using technology that keeps them connected to people at all hours of the day. There are many different ways in which cyberbullies reach their victims, including instant messaging over the Internet, social networking web sites, text messaging and phone calls to cell phones. There are different forms of cyberbullying including, but not limited to, harassment, impersonation, and cyberstalking. It has been found that there are differences between not only the prevalence of cyberbullying between males and females but also the ways in which males and females cyberbully. Like bullying, cyberbullying is a serious problem which can cause the victim to feel inadequate and overly self-conscious, along with the possibility of committing suicide due to being cyberbullied. Two such cases are included in this paper. There are numerous ways in which schools and parents can prevent cyberbullying and ways in which they can intervene if it has occurred. The Graduate School University of Wisconsin Stout Menomonie, WI Acknowledgments iii...

Words: 7462 - Pages: 30

Premium Essay

Guide-to-Managerial-Communication-9th.Pdf

...Heine Director of Editorial Services: Ashley Santora Editorial Project Manager: Karin Williams Director of Marketing: Patrice Lumumba Jones Marketing Manager: Nikki Ayana Jones Marketing Assistant: Ian Gold Managing Editor: Central Publishing Project Manager: Debbie Ryan Production Project Manager: Clara Bartunek Creative Director: Jayne Conte Cover Designer: Karen Salzbach Cover Art: Getty Images, Inc. Media Editor: Denise Vaughn Media Project Manager: Lisa Rinaldi Full-Service Project Management: Aparna Yellai/PreMediaGlobal Composition: PreMediaGlobal Printer/Binder: Edwards Brothers Annex Cover Printer: Lehigh Phoenix Color Text Font: 10.5/12 Times New Roman Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within the text. Copyright © 2012, 2009, 2006, 2003, 2000. Mary Munter Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All right reserved. Manufactured in the United States of America. This publication...

Words: 49486 - Pages: 198

Free Essay

Bash for Beginners

............................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need? ...............................................................................................................................4 9. Conventions used in this document.....................................................................................................4 10. Organization of this document...........................................................................................................5 Chapter 1. Bash and Bash scripts...

Words: 29161 - Pages: 117

Premium Essay

Software Engineer

...Times: Monday and Wednesday, 08:00-09:30 am | |Location: UTC 1.118 | Instructor: David Chandler E-mail: david.chandler@phd.mccombs.utexas.edu Office: CBA 3.332K Tel: (512) 471-2548 Office hours: Monday, 10:00-11:00 am Wednesday, 10:00-11:00 am Immediately after class and at other times by appointment. REQUIRED COURSE MATERIALS (Available at the University Co-op) 1. Course reading packet: Selection of Harvard Business School case-studies, Harvard Business Review articles, as well as other articles and book chapters. COURSE OBJECTIVES This class is the capstone class for students studying at McComb’s School of Business. It is an essential component of your business degree. The overarching goal, therefore, is to build on the classes you have taken elsewhere in the business school and help prepare you to enter the workforce. The starting...

Words: 4693 - Pages: 19

Premium Essay

International Marketing

...UNIVERSITI TUNKU ABDUL RAHMAN (UTAR) Faculty of Business and Finance Unit Plan 1 2 Unit Code & Unit Title: Course of Study: UBTI2013 GLOBAL MARKETING Bachelor of Marketing (Hons) Bachelor of Business Administration (Hons) Bachelor of International Business (Hons) Bachelor of Business Administration (Hons) Entrepreneurship Year One Year Two 201401 3 credit hours 2 hours lecture per week for the duration of 14 weeks. 1.5 hours tutorial per week for the duration of 14 weeks 7 Lecturer and Tutor: Lecturer / Tutor  Mr. Neerjang Lama (Faculty of Business & Finance) neerjang@utar.edu.my  Dr Falahat Nejadmahani Mohammad (Faculty of Accountancy & Management) falahat@utar.edu.my 3 Year of Study: 4 5 6 Year and Trimester: Credit Hour Lecture hours & tutorial hours 8 9 Mode of Delivery: Moderator Lecture & Tutorial Dr Gengeswari a/p Krishnapillai - Assistant Professor gengeswarik@utar.edu.my 10 Objective: The objectives of this unit are:  To provide a theoretical framework for analyzing global marketing strategies and orientations.  To examine the relationship between global marketing environments and global marketing strategies.  To examine the concept of global marketing research and its impact to the global marketing.  To import the knowledge of various entry modes into a foreign market place.  To highlight various marketing mix strategies applicable to global marketing. 11 Learning Outcome: On completion of this unit, a student shall...

Words: 5423 - Pages: 22

Free Essay

Foundations of F-Sharp

...The eXPeRT’s VOIce ® In .neT F# Robert Pickering Foreword by Don Syme Foundations of Foundations of F# Robert Pickering Foundations of F# Copyright © 2007 by Robert Pickering All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN-13: 978-1-59059-757-6 ISBN-10: 1-59059-757-5 Printed and bound in the United States of America 9 8 7 6 5 4 3 2 1 Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Lead Editors: James Huddleston, Ewan Buckingham Technical Reviewer: Don Syme Editorial Board: Steve Anglin, Ewan Buckingham, Gary Cornell, Jason Gilmore, Jonathan Gennick, Jonathan Hassell, Chris Mills, Matthew Moodie, Jeffrey Pepper, Dominic Shakeshaft, Matt Wade Project Manager: Elizabeth Seymour Copy Edit Manager: Nicole Flores Copy Editor: Kim Wimpsett Assistant Production Director: Kari Brooks-Copony Production Editor: Laura Cheu Compositor: Lynn L’Heureux Proofreader: Elizabeth Berry Indexer: Broccoli Information Management Artist: April Milne Cover Designer: Kurt Krames Manufacturing Director: Tom Debolski Distributed...

Words: 52491 - Pages: 210

Premium Essay

How to Write Essays

...TO WRITE GREAT ESSAYS HOW TO WRITE GREAT ESSAYS Introduction 1 2 3 4 5 6 7 8 vii Organization 1 Clarity 11 Word Choice 21 Mechanics 39 Revising, Editing, and Proofreading 55 Untimed Essay Writing Strategies 67 Timed Essay Writing Strategies 85 Sample Essay Prompts and Essays 97 Resources 111 CONTENTS HOW TO WRITE GREAT ESSAYS v Introduction n your preparations for college, you may find yourself facing a handful of high-stakes essays. Your college application requires at least one, and the SAT requires another. Depending upon the high school you attend, or the state you reside in, you may need to write an exit essay, or take the Regents Exam. This book includes specific strategies to help you write great essays, no matter which type you write. In contrast to basic writing guides that contain plenty of information you don’t need, How to Write Great Essays focuses on the topics most important to you now. You won’t find a comprehensive guide to mechanics, but instead you will get short but thorough lessons on the most common errors made in grammar, spelling, usage, and how to prevent and correct these errors. Every chapter is designed to relate directly to your essay, giving you the knowledge and the know-how you need to succeed. The book is divided into seven chapters, with the first five covering different aspects of the writing process: I Introduction ...

Words: 22300 - Pages: 90

Premium Essay

Access 2007

...Microsoft® Office Access 2007 ™ ALL-IN-ONE DESK REFERENCE FOR DUMmIES ‰ by Alan Simpson, Margaret Levine Young, Alison Barrows, April Wells, Jim McCarter Microsoft® Office Access 2007 ™ ALL-IN-ONE DESK REFERENCE FOR DUMmIES ‰ Microsoft® Office Access 2007 ™ ALL-IN-ONE DESK REFERENCE FOR DUMmIES ‰ by Alan Simpson, Margaret Levine Young, Alison Barrows, April Wells, Jim McCarter Microsoft® Office Access™ 2007 All-in-One Desk Reference For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www...

Words: 190131 - Pages: 761

Premium Essay

Html Text

...JavaScript Chapter 1: Introduction to Web and Internet...................................................................................3 Chapter 2: HTML's Role on the Web...........................................................................................13 Chapter 3: Creating a Web Page and Entering Text ....................................................................24 Chapter 4: Changing and Customizing HTML Text....................................................................33 Chapter 5: Displaying Text in Lists .............................................................................................43 Chapter 6: Adding Graphics to Your Web Pages.........................................................................54 Chapter 7: Hypertext and Creating Links.....................................................................................64 Chapter 8: Clickable Image Maps and Graphical interfaces........................................................74 Chapter 9: HTML Forms..............................................................................................................85 Chapter 10: Images, Multimedia Objects and Background Graphics ..........................................96 Chapter 11: Adding Tables to your Documents.........................................................................102 Chapter 12: Frames ....................................................................................................................110 Chapter 13:...

Words: 56638 - Pages: 227