Ethical or societal implications

Assignment Help Basic Computer Science
Reference no: EM133168858

Part 1

Select an industry that you would like to work for and an IT role that you would like to assume in the future.(Senior Devops Engineer)

• State what industry that is and why you want to work as an IT professional in that industry.

• State what IT role you'd like to be in, and why you can envision yourself in that role.

• Describe 2 to 4 ethical or societal implications of the use of the IoT in that industry.

o You are not required to answer these questions, but they may provide you with guidance on assessing potential implications:

- Do you know whether the IoT is already implemented in that industry?

- What kind of impact would the IoT have in that specific industry based on its users?

- Based on what you already know, are any regulations, laws, or organizational policies already in place to address any of these implications?

Part 2

- Suggest at least two more implications or ethical issues that could occur with the IoT in that industry.

- Discuss how those issues can impact individuals outside of that industry and the larger society.

Reference no: EM133168858

Questions Cloud

Description of formative and summative program : Post a description of both formative and summative program evaluation types. Include an explanation of each type's purpose, scope, development, and use from a g
What is the expected return for each company : You have forecast an equity risk premium of 7%. The risk free rate is 5%. Calculate the expected return
Packet-switched and circuit-switched networks : Discuss the major differences between (a) packet-switched and circuit-switched networks and (b) switched and routed backbones.
Calculate the company break-even point in units : The following information is available for AKD Corporation for last month:
Ethical or societal implications : Describe 2 to 4 ethical or societal implications of the use of the IoT in that industry.
What are the relevant facts : What are the ethical issues for John? Include and critically analyse the different perspectives of utilitarianism versus rights (deontology)
Stage of development and implementation : Reflection on the challenges that the business may encounter (or has encountered) at the stage of development and implementation of the business strategy, in li
How can a company control and manage conflicts of interest : Mai's husband's aunt died recently, and the estate is being finalised. How can a company control and manage conflicts of interest
Creating a vision for social good : 1. Our textbook emphasizes creating a vision for social good. However, throughout history there have been leaders who created visions for evil purposes.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Unauthorized charge on your credit card

Explain the incident that occurred, and then list the steps you would follow to solve this case

  Combining multiple anomaly detection techniques

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

  Computer networks are wonderful-typically work flawlessly

Computer networks are wonderful and typically work flawlessly as all people benefit from using application on their phones, such as mobile banking,

  Integrating coso framework compliance

Discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

  Why are nand gates known as universal

Why are NAND gates known as universal, and what is the advantage of a universal gate?

  Risk management-mitigation plan for security vulnerabilities

The CIO of your organization has asked you to create a risk management and mitigation plan for security vulnerabilities.

  Which program do you feel you are strongest

After covering Word, Excel, and PowerPoint. In which program do you feel you are strongest? What do you think you could do to bolster your strength in the other

  How have apple and facebook attempted to compete with google

What is the significance of search to the success or failure of mobile computing? How have Apple and Facebook attempted to compete with Google? Will their strategies succeed?

  What are the problems with horizontal and vertical solutions

What expectation should there be for a database management system with regard to handling data control issues such as data security, backup and recovery, and concurrency control? Why?

  What is cambridge polish notation

Explain the difference between prefix,infix, andpostfixnotation. What is Cambridge Polish notation? Name two programming languages that use postfix notation.

  Research most current ways to prevent identity theft

Research the most current ways to prevent identity theft. List the pro's and con's of the one you feel would be the most effective.

  What security threats from social networking

What security  threats from social networking  also apply to other businesses? Which do not? Why do you think so?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd