Free Essay

Week 4 Db Mit Principles of Information Systems Itc 610

In:

Submitted By book907
Words 1015
Pages 5
Christopher Chapman
Week 4 DB
AIU Online

The electronic auction websites have a role of providing the mean to the people who want to sell their electronic devices on the websites in order to get the maximum sale price of the product. The role of these auction sites is to reduce the risk of sellers, protect intellectual property rights, support laws and regulations, provide equal opportunity to the sellers and provide the more enjoyable buying and selling experience to the visitors. There should be proper policies for buying and selling electronic items on the auctions websites (Jacobson, 2003- 2015).
No, sellers should not be able to post whatever they want without sensitivity to others because each electronic or non-electronic auction website has some rules and policies using which the sellers have to sell their products on these websites. Some sensitive items should not be posted on these websites as these posts can hurt someone’s feeling. Like a well- known auction website does not allow the sale of some items like firearms, weapon, random drawings, offensive material which includes items that are racially and ethnically inappropriate and some electronic sex toys etc. So these sensitive items should not be posted on auction websites.
The control that should be placed on the auction of electronic elements on auction websites should consist of rules, compliance monitoring and enforcement. Rules define the lines between violation and norms between sanction and approval. Monitoring is important in order to keep the detecting, investigating and prosecuting the chances of violation. Enforcement can be considered as the magnitude of sanctions of being found guilty of a violation. It is completely up to the website to keep the controls over the sale of electronic devices.
There are different types of ethical issues which can arise in electronic auctions and that are, sensitive electronic devices are posted on the websites by the porn stars, different fraud cases like quality is not as per requirement, misrepresentation, non-delivery and sellers try to sell stoles electronic devices on the websites. Different auction websites have some way to deal with the frauds and keep monitoring the posts in order to address the ethical issues. Despite of electronic auction website, all e-commerce website rely on their user to report the unethical sale or fraudulent (McManus, 2009).
There are different measures can be used in order to describe the ethical issues like website should keep reviewing the posts and handle the case of fraudulent efficiently. Like eBay has become one of the largest targets for fraud online and also has some measures to restrict the frauds to sell anything on their site. Some other well-known sites can collect the user’s feedback in order to detect the fraudulent and low quality product. The company should also take essential steps by collecting the user’s feedback about non delivery or misrepresentation of the product.
References:
Jacobson, L. (2003- 2015). Information Systems Resources: Networks, Hardware, Software, Data & People. Retrieved from http://education-portal.com: http://education-portal.com/academy/lesson/information-systems-resources-networks-hardware-software-data-people.html
McManus, B. (2009, April). Growing a Green Corporation . Retrieved from http://www.schneider-electric.com: http://www.schneider-electric.com/solutions/id/en/med/4664155/application/pdf/1014-growing-a-green-corporation.pdf

Firewall systems remain commonly applied all through computer networks. Firewalls act as measures of control, implementing all related components of security policies. Firewalls may be many numbers of different mechanisms like routers or the gathering of host machines. Though, a basic function of the firewall is the protection of the integrity of a network which remains firewall controlled. At hand are diverse kinds of firewalls that may be implemented, through a choice of the firewalls being reliant on that security policy and also any level of deployment within the system. Anti-virus (AV) is utilized in the effort to openly protect any system from damages. AV detects the specific types of unauthorized activities within the forms of mischief mobile code, communally known such as malware. When describing intrusion detection systems, it possibly makes sense to define what they remain not to be. IDS’s are not preventive measures. They won’t stop intruders from breaking into systems. Neither prevents internal damages to the systems. They’re detection systems, recognizing exploitation of the system then reporting them as it transpires.
Individual Project (total points: 120)
• Discuss advantages and disadvantages for the system proposed: 35
• What ethical problems could this system create? Provide at least two examples of problems: 40
• Discuss if it matters whether the customers are individuals or businesses: 30
• APA writing standards: 15
Both augmented reality and virtual reality are alike within the goal engage the users, though both these systems function within different ways. Augmented reality users remain to stay in touch within this real world though interacting using virtual objects all around them. Virtual reality users are isolated from this real world while occupied within worlds that are totally fabricated.
When it comes to augmented reality, we're looking at something that has found more success in the consumer space when compared to virtual reality. We've seen several applications with AR, along with video game and hardware devices such as the Google Glass. It is clear that the way things are right now, AR has the upper hand against VR, and that might not be changing anytime soon.
What is Augmented Reality
Augmented reality is the blending of virtual reality and real life, as developers can create images within applications that blend in with contents in the real world. With AR, users are able to interact with virtual contents in the real world, and are able to distinguish between the two.
What is Virtual Reality
Virtual reality is all about the creation of a virtual world that users can interact with. This virtual world should be designed in such a way that users would find it difficult to tell the difference from what is real and what is not. Furthermore, VR is usually achieved by the wearing of a VR helmet or goggles similar to the Oculus Rift.

Similar Documents

Premium Essay

Mass Media

...Media History Contents 1 Introduction 1.1 Mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.1 1.1.2 1.1.3 1.1.4 1.1.5 1.1.6 1.1.7 1.1.8 1.1.9 Issues with definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Forms of mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Purposes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Professions involving mass media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Influence and sociology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Ethical issues and criticism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . See also . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 1 2 6 6 7 8 10 10 10 10 11 11 12 12 12 12 16 16 17 17 17 17 17 17 18 19 20 21 21 21 1.1.10 Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.11 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.12 Further reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.13 External links . . . . . . . . ....

Words: 146891 - Pages: 588