Reference no: EM132639829 , Length: word count:500
DATA4300 Data Security and Ethics - Kaplan Business School
Role Play: Ethics Officer Presentation to Company Board
Class Activity and presentation
Task
• Form a small group of three or four students
• Evaluate a business problem from a data privacy, security and ethics perspective
• Make recommendations to the board
• Learning outcomes LO4, L05 and general ethical considerations
Assessment Description
Business Problem: Imagine a large technology company "Moogle" has noticed that there is bias inherent in its recruitment processes (people seem to hire people similar to themselves). Moogle wants to encourage diversity in its recruitment. They are considering adopting AI recruitment tools, for screening large numbers of candidates. This process is the second step in the hiring funnel.
The technology addresses the current failure of recruiters to fill jobs and fill them with the appropriate people.
One of these tools is a resume filtering algorithm. This application has great potential since it could efficiently screen candidates in an objective way, excluding human bias. On the other hand, non-human selection and storage of potential employee data raises a number of ethical, privacy and security-related questions. For example, is it compliant? Does the selection of candidates using key words make sense? Are employees with common names/particular appearance only going to be offered an interview? How long will the data be stored? Is the data secure? Is the technology more biased than humans?
A description of this screening algorithm is below:
"The second step, screening, is crucial as this is where algorithmic bias can strongly influence whether your application is rejected. Screening uses algorithms that systematically decipher your cover letter and CV and save this information in the company's HR database. This information could include your years of experience, the languages you speak, the university degrees you obtained and the countries in which you have you worked. Algorithms are then used to narrow down the selection of candidates automatically - not in an affirmative way, but by rejecting those who do not fit. The company CVViZ, for example, employs machine learning algorithms to screen resumes for keywords in context and to create relative rankings between the different candidates.
You will perform a group role play focussing on the privacy, security and ethical issues around using this screening algorithm to sort CVs.
• Your lecturer will form groups of 3-4 in your online class.
o You will have 1 hour to do Part A below and submit one page of dot points to the teacher [20 marks]
o 10-minute break
o You will have (2 min x 4 = 8 minutes to do Part B below (Perform the group role play) [10 marks]
• This task is open book
Assessment Tasks
Part A: Decide which of the following four roles (below) you will take as a group recommend to the board of Moogle whether or not they should adopt a filtering algorithm to sort through CVs and overcome the bias in its recruitment process.
After 1 hour submit one page of dot points to Turnitin on MyKBS. The points should:
1. Outline brief recommendation to the board and briefly justify these recommendations with reference to ethical, legal and security principles.
2. Incorporate the views of all four roles below in your submission. Each group member should chose a role to play, and have their own notes based on the stance of their role (will be used in Part B).
3. Be no more than 500 words. One group member should submit these on Turnitin with the names of all group members by the end of the time.
o The HR Business lead - who will explain how potential employees & your company will benefit from the application and the opportunities the technology offers.
o Ethics & Privacy Officer - who will explain how the information will be handled in a ethical manner, while respecting each potential employee's privacy (including handling requests for removal of data)
o The Security Officer - who will explain matters related to the database security (encryption) & integrity (possibly blockchain technology)
o Government regulator (on the Board) - who will ask the other members questions and make sure the technology is compliant and not marginalising any part of society.
Part B: Perform the role play to the class. Imagine you are speaking to the company board and recommending whether they need to use this technology. Each group member will have 2 minutes to speak and students will be marked individually and as a group.
Consider that you are presenting to a board of diverse stakeholders who have limited knowledge of issues pertaining to data ethics, security or legislation.
Note: Need Only Part A
Attachment:- Data Security and Ethics.rar