Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Beside each situation below, place a check by the term(s) that best reflects your opinion of the behavior of the individual. Provide your reasoning for each of your answers using both the ethical codes of conduct and the information on computer crimes presented in this chapter.

a. John and Beth are both enrolled in the same section of a computer class. The textbook is expensive so they decide to split the cost and share the required textbook. The book includes access to a Web site; however, it is designed so only one account can be established. They elect to establish one account in Beth's name and share the password.

John: Ethical___ Unethical___ Computer crime___
Beth: Ethical___ Unethical___ Computer crime___

b. At the end of the term John and Beth decide to sell the textbook and the Web access to a student, Robert, who will be taking the course next term. While the password for the Web site can be changed the user name cannot be changed.

John: Ethical___ Unethical___ Computer crime___
Beth: Ethical___ Unethical___ Computer crime___
Robert: Ethical___ Unethical___ Computer crime___

c. Susan is a senior nursing student recovering from a respiratory infection that required treatment with antibiotics. She was glad to be told by her doctor that by Wednesday she will no longer be contagious. This term Susan is taking Nurs 401. In this course the students are expected to obtain their clinical assignment on Tuesday and prepare for a 6-hour clinical on Wednesday. Susan asks a classmate, Betty, who is assigned to the same clinical unit to check her assignment and to make notes of the information she will need to research, such as the patients diagnosis, significant diagnostic tests, medications, and treatment. The classmate is glad to be of help because they often work together in preparing for

clinical and helping each other on the clinical unit.
Susan: Ethical___ Unethical___ Computer crime___
Betty: Ethical___ Unethical___ Computer crime___

d. Betty was surprised to discover that she was not able to help Susan. On Tuesdays nursing students are only able to access the patient(s) on the hospital computer system that are included in their assignments. Betty notifies Susan, who then calls her clinical instructor, Dr. H. Ple to explain her dilemma. Dr. H. Ple comes to the clinical unit and prints offthe information. She blacks out the patient's name and gives the printout to Betty who takes it back to Susan.

Susan: Ethical___ Unethical___ Computer crime___
Betty: Ethical___ Unethical___ Computer crime___
Dr. H. Ple: Ethical___ Unethical___ Computer crime___

e. James is assigned to an observational learning experience in a busy emergency department. Five patients from a multiple-car accident have just been admitted and more are expected. James is observing Dr. Smith who is gloved and intubating one of the patients. All of the staff are currently busy caring for the other patients. Dr. Smith's beeper emits a series of beeps. Dr. Smith explains to James that the beeper is hospital issued and requires a password. She tells James that the series of beeps indicates an emergency and she asks James to use her password to sign on and read the text message aloud. James signs in with Dr. Smith's password and reads the message, which includes a patient's name, a brief description of the problem, and requests for a return call STAT.

James: Ethical___ Unethical___ Computer crime___
Dr. Smith: Ethical___ Unethical___ Computer crime___

f. Brian is creating a Web page and finds a terrific background graphic on another page. He copies the background to use on his page. He also includes at the bottom of the page in small print a link acknowledging the source of the background.

Brian: Ethical___ Unethical___ Computer crime___

g. Several healthcare providers are collaborating on an important research study that includes a review of the patient's history, a guided interview, and a computed tomography scan (CT) for each patient participating in the study. The hospital Institutional Board of Review (IRB) has given permission for data collection of the patients' health history via computerized patient records for patients who have signed the informed consent forms. In the past, once the IRB approval was obtained, the principal investigator (PI) sent a list of names of the co-investigators to the IT department to establish their research-related computer accounts. The co-investigators would then review the patient's records and set up the data collection format for each patient. Late Friday afternoon the PI receives a memo explaining that the IT procedures have been changed and the accounts will not be established until the co-investigators have signed the appropriate forms and received training that includes the policies and procedures for using the computerized patient records. Several patients have already been scheduled for interviews and CTs on Saturday. All of the co-investigators currently have access to the computerized record for these patents via their hospital responsibilities. The PI and co-investigators decide to use their hospital access and deal with the change in procedures on Monday.

PI: Ethical___ Unethical___ Computer crime___
Co-investigators: Ethical___ Unethical___ Computer crime___
IT Department: Ethical___ Unethical___ Computer crime___

h. Terri has taken 21 credits this term and has had a very difficult time keeping up. In 48 hours she must turn in a term paper on the use of computers in health care. She discovers an online term paper titled The Use of Computers in Rural Hospitals. The outline is perfect so she uses the paper as a "jumping off point," making significant revisions to the paper. Since she does not cite a specific section of the paper she does not include the paper in her references.

Terry: Ethical___ Unethical___ Computer crime___

i. Dr. Bob is teaching a computer course. The university purchased a site license for 25 copies of the software he is distributing to students. However, 25 students are registered for the course. Dr. Bob gives each of the students an account and sends in a purchase request for additional copies so he will also have access. A week later he receives a call from the purchasing department informing him that the site licenses are only sold in bundles of 25 and cost $500. Dr. Bob decides to wait a week to determine if any students drop the course. If a student does drop the course Dr. Bob plans to use the student's account for his own access.

Dr. Bob: Ethical___ Unethical___ Computer crime___

j. James is completing his senior year as a nursing student in a BSN program. A patient he cared for a few weeks ago obtained his email address from the online university directory and sent him an email. In the email the patient discussed new and potentially serious symptoms and asks that James keep his concerns confidential. James believes the symptoms may indicate a life-threatening situation. He forwards the email to the charge nurse on the unit where the patient was treated and to the senior resident involved in the patient's care.

James: Ethical___ Unethical___ Computer crime___

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91598019
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Lets do some r suppose you have the following situation you

Let's do some R.... Suppose you have the following situation: You have a large jar of beans, 43% black, 57% white. You take a sample of 14 beans. a) Use R to figure out the probability for every single possible outcome. ...

Sql for databasebuild a query of all students on athletic

Sql for database Build a query of all students on athletic scholarship. Additionally, produce a report with descriptive report and column headings. Be sure there is enough data to prove the selection and sort worked as r ...

Question after 1 year of launch ride sharing increased a

Question: After 1 year of launch, ride sharing increased a lot resulting in a lot of insertion requests to the database. Consider there is no room to further increase the size of server and changing database is not an op ...

Elm industries receives profits from polluting according to

Elm Industries receives profits from polluting according to the formula: (pi=10Q-Q^2) The Damages associated with pollution from this facility are estimated to be: (D=Q^2+2Q) (Q= pollution emitted in tons) , and profits ...

Stacksthere are two main operations associated with stacks1

Stacks There are two main operations associated with stacks; 1) putting things on the stack which is referred to as push, 2) taking things from the stack which is referred to as pop. We can create a stack using linked li ...

The monthly sales demand for a new product is uncertain but

The monthly sales demand for a new product is uncertain, but it is considered to be adequately described by a normal random variable with mean 50,000 units and variance 100,000,000. (a) A factory to manufacture the new p ...

Question 1 suppose i need 10 bits to specify the offset

Question 1 : Suppose I need 10 bits to specify the offset within a page and 22 bits to specify the virtual page number and 18 bits to specify the physical page number. How big is a page in bytes? How big is the virtual m ...

Question the below table shows the instruction count ic for

Question : The below table shows the instruction count (IC) for programs running on three processors P1, P2, and P3 with the clock rates 1.0 GHz, 2.5 GHZ, and 2.0 GHz respectively. Each program consists of only Load/stor ...

Question suppose a problem can be solved with two different

Question : Suppose a problem can be solved with two different algorithms, A or B. Algorithm A has a time complexity of TA = 17n, and algorithm B has a time complexity of TB = 0.5n 2 . Give the range of n for which it is ...

String problemfor each numerical value 0 1 2 9 0 lt number

String Problem For each numerical value 0, 1, 2, ...9 (0 Print the converted sentence both to the screen and to an output file. Your input file consists of a variable number of records. Each record is a sentence of lengt ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As