1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marina86 [1]
3 years ago
8

What are the ethical implications of online social media after someone has died

Computers and Technology
2 answers:
solong [7]3 years ago
8 0
The growth of "digital legacies" is already throwing up legal and ethical issues<span>: it's a violation of many websites' terms of service for surviving relatives to go on using your passwords; and digital libraries of messages and photographs can't easily be passed on unless the correct consent is in place. Facebook has already gone to court to oppose the idea that families can force it to hand over data.</span>
IRISSAK [1]3 years ago
7 0

Answer:

<em><u>The answer is</u></em>: <u>Today there are not, or there are very few ethical implications of online social networks after someone's death.</u>

Explanation:

<u>Social networks every day provide the highest degree of presence, they also involve large risk tests regarding privacy</u>.

<u>Given these concerns, a minimum requirement would be for companies a guarantee that</u>:

1.- Consumers are informed about how their data can be displayed after mortem.

2.- users are not represented radically different from the bot in which they originally entered.

And 3.- users only upload data that belongs to them personally, that is, do not make bots of a deceased relative or friend.

<u>Requirements such as these could be imposed by regulators</u>, but may equally well be established by internal agreements within the industry, such as the COM Code of Ethics, or even be incorporated into the ethical, work of politicians, of individual companies.

Today, however, there are no or very few explicit requirements like these.

<u>These concerns require care, research, and dialogue</u> between policy makers, industry and expert scholars.

<u>They will only grow in importance as the dead become increasingly numerous online, in developing a constructive ethical approach:</u> The first step is to decide to what extent, and under what circumstances, the memory of the deceased must be conducted and shaped by the commercial Industry interest

The second, and equally important, the step will be to develop a regulatory framework, commonly adapted to ensure the dignity of those who are named and remembered online.

<em><u>The answer is</u></em>: <u>Today there are not, or there are very few ethical implications of online social networks after someone's death.</u>

You might be interested in
What can be designed to create annoying glitches or destroy data
Yanka [14]
Viruses can cause this.
3 0
3 years ago
When recording data on a multiple-disk storage system, should we fill a complete disk surface before starting on another surface
Cerrena [4.2K]

The user needs to complete the entire disk surface first before starting another surface.

Explanation:

When you are using a multiple disk storage system to write the data the disk automatically writes the disk based on the algorithm for better efficiency and availability of the disk space.

hence when you are recording a data on a multiple disk storage system, it is recommended to fill the complete disk surface initially before you start the another surface to record the data.

4 0
3 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
3 years ago
The function keys are labeled from f1 to wat
Fed [463]
If we are talking about a simple North American Keyboard, The answer would be F1 to F12
Hope this Helps!!!
8 0
3 years ago
Explain why database management systems are used in hospitals? Discuss
Sergeeva-Olga [200]

The reason why database management systems are used in hospitals is because the use of Healthcare databases aids in terms of diagnosis and treatment, handle documentation and billing, and others.

<h3>What is a database management system in healthcare?</h3>

A database management system (DBMS) is known to be a type of software that has been developed to help people to form and keep databases.

It is one that helps to lower the risk of errors associated with medical operations and management. It reduces  paperwork and staff and also improves  performance.

Learn more about database management from

brainly.com/question/24027204

8 0
2 years ago
Other questions:
  • What is the utility of a lever?
    11·2 answers
  • Suppose that a company offers quantity discounts. If up to​ 1,000 units are​ purchased, the unit price is ​$1010​; if more than​
    7·1 answer
  • Sorry to bother you guys but for some reason it wont let me comment. How can i fix this?
    5·2 answers
  • What is this I’m so lost
    9·1 answer
  • How do you change your age on here? I accidentally put that i was 15 but i am only 13. How do I change this?
    12·1 answer
  • Data cannot be sorted or filterd accuratly if there are ________.
    12·1 answer
  • Which property is assigned to a file by the operating system?
    13·1 answer
  • Ineeedd help please 35 points question
    5·1 answer
  • 13./ Write a java program to input an integer N and compute its factorial. Print the number and the factorial.
    8·1 answer
  • As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After s
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!