1. Write an essay discussing the ethics, risks and benefits of using cookies and spyware to track customer browsing and online purchasing habits.
Nowaday, hacker is someone makes the technology's life to be more interesting. The term hacker has evolved over the years and been growing. For years there existed a fuzzy distinction between good and bad computer hackers, or we also call them white hat and black hat hackers. Whether they are good or bad, we can't negate they don't have any influence on the development of technology. Hiring known hackers to test the security of a system is an example of this idea.
Some companies have the great database which stores information about back hat hackers. It's made and developed by white hatters. These hackers break into systems and report holes that company engineers quickly seal. Companies need to have appropriate way to choose hackers to hire. Another positive aspect to hiring reformed hackers as security consultants is that staying up with the latest security exploits and
2. Apply the seven stages of ethical decision making (described on page 17) to decide whether to legalize online poker. In your paper, clearly describe all details involved in each step.
3. Write a paper researching various ways companies monitor employee use of computing resources, including access to the Internet and e-mail.
4. Design an IT use policy for a software company that develops banner ads for a search engine, tailored to the subject being searched for. Keep in mind that the employees of such a company would need unlimited access to the Web.
5. Write an essay discussing the pros and cons of hiring known hackers to test the security of a system.
6. Write a paper discussing the ethics, and consequences (including effects on productivity and morale) of different types of workplace monitoring.
B. Create your own Career Development Path. Describe your competencies, preparations for each of your decisions, your