Discuss the applicable ethical theory

Assignment Help Management Information Sys
Reference no: EM13759965

• Describe a current IT-related ethical issue: Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas.

• Define a concise problem statement extracted from the above description. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a matter of public policy or law that it may require a regulatory body or congressional approval to take action to implement a solution.

• Analyze your problem using one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the paper.

• Discuss the applicable ethical theory from Module 1 that supports your decision

• Prepare a minimum 3- 5 page, double-spaced paper and submit it to the Assignments Module as an attached Microsoft Word file.

• Provide appropriate American Psychological Association (APA) reference citations for all sources you use. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

Reference no: EM13759965

Questions Cloud

Standards research ieee-iso-ansi : Select one (1) of the working groups in the IETF or IEEE and briefly summarize what this group is working on.
Synopsis on internet fraud : Write a 400-500 words synopsis on Internet Fraud use at least three sources in your review of the topic. Your review should be similar to a "literature review lite" which covers the topic in some detail, but not fully, due to the constraints in t..
Case study incident-response policy-gem infosys : Case Study Incident-Response Policy; Gem Infosys, Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days
Influence the economys growth rate : Identify at least four policies from the textbook that the government has created to impact economic growth and productivity.
Discuss the applicable ethical theory : Define a concise problem statement extracted from the above description. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma. Be aware that if it is a ma..
Case study- risk management policy : Case Study- Risk Management Policy, You have just been hired as an Information Security Engineer for a large, multi-international corporation.
Case study - personal computer security threats : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.
Open directory project : Browse the subject categories in the Open Directory Project (do NOT use the search engine) to find the name of the student newspaper for Mt. Hood Community College in Oregon. a. How did you find it? Outline your steps and list each heading and sub..
Case study - asymmetric and symmetric encryption : Case Study - Asymmetric and Symmetric Encryption, ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics

Reviews

Write a Review

Management Information Sys Questions & Answers

  Illustrates the negative impact of using it unethically

example that illustrates the negative impact of using IT unethically.

  Comment on mobile wireless industry

Brief Comment on the Mobile Wireless Industry - What factors shape the profitability of the mobile wireless provider industry?

  Patient and affordable care acthow will it affect health

patient and affordable care acthow will it affect health care in terms of cost?how will the law affect health care in

  Evaluate the organizing function of management

Prepare a paper in which you evaluate the organizing function of management as it relates to at the following organizational resources - Show whether or not your organization has optimized these organizational resources for effectiveness and efficie..

  Yu will conduct research and analyze information to make

you will conduct research and analyze information to make recommendations for an updated system that can meet the

  Data security products and servicesprovide two businesses

data security products and servicesprovide two businesses with their web that provides data security products and

  Show the information flows and product flows

A company has two product lines, A and B. If the company is moving from two independent systems for the two lines to an integrated system, what are the requisite changes in required data, information flows, and product flows?

  Difference between analog and digital signals

Identify the difference between analog and digital signals. Provide an example of a digital signal and an analog signal. Which type are you more likely to encounter? Why?

  Case study thought it was safer than starting his own

case study thought it was safer than starting his own business after nearly thirty years of employment which ended as a

  Information politics

Information Politics - Do you have experiences that you can describe about user support (as a user or as an IT person)? why were they good or bad? what suggestions do you have?

  How the internet is used and viewed by consumersinclude

how the internet is used and viewed by consumersinclude information on how the internet is used and viewed by consumers

  Information technology - sdlc waterfall approach

Information Technology - SDLC Waterfall Approach - Why is an accurate and complete requirements definition

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd