How do issues of privacy and confidentiality apply in case

Assignment Help Computer Engineering
Reference no: EM133649894

Assignment: Park Manager as an Undercover Detective

You are a park manager in a famous national park that attracts millions oftourists and campers per year. You perform a variety of professional services in the overall management of the park and its recreation area. You are also responsible for the administration and management of park activities. The park has unique natural resources and is considered to be a natural heritage site. Recently, however, you have noticed a dramatic deterioration of these resources, particularly at the campground and recreation area. Based on the amount of litter, damage caused by unintended fire and animals' persistent search for food around these areas, you suspect that the deterioration problem is caused by the visitors' unsustainable and environmentally unfriendly patterns of behavior.

You decide to investigate this issue and to conduct an undercover/disguised observational research study [i.e., directly and systematically observing human behavior] of the environmentally unfriendly patterns of behavior among the visitors. Additionally, you plan to informally interview a sample of visitors about their practices in the park without disclosing that you are a park manager. You decide not to wear your uniform and to present yourself as a fellow visitor. You believe that this will allow the collection of authentic responses and behaviors. You plan to publish a report based on these findings.You also plan to take pictures of unethical behaviors that you will include as an evidence in your report that you will post online.

However, something bothers you about your plan. You ask yourself:

(When answering questions, refer to both disguised observations and informal interviews that you were planning to do)

Question A. How does the issue of informed consent apply in this case? Should I anticipate any problems with the planned approach to data collection?

Question B. How do the issues of privacy and confidentiality apply in this case?

Question C. How does the issue of deception and disclosure apply in this case? (talk about how "acts of commission" and the "acts of omission" potentially apply here, which we learned in class).

Question D. Do you think the study could be done ethically at all? Why or why not? Support your conclusions with a specific scenario of the research methods process from beginning to end.

Reference no: EM133649894

Questions Cloud

What were your volunteer duties-accomplishments : What were your volunteer duties/accomplishments? What type of volunteer were you, unskilled or professional?
Describe the support and maintenance requirements : Describe the support and maintenance requirements. Describe the implementation and testing procedures. Explain the impact of compliance on implementation.
How would you decide which system to choose : What are some factors to be considered when selecting an EMR system? How would you decide which system to choose?
What business processes are most likely to use dfds : What business processes are most likely to use DFDs? Who is the audience for Data Dictionaries and how important is it for end-users to understand their data?
How do issues of privacy and confidentiality apply in case : How does the issue of informed consent apply in this case? How do the issues of privacy and confidentiality apply in this case?
Write about the war on israel and hamas : Please write a 750 word response about the war on Israel and Hamas. Explain both positions and explain who's side you are on if any?
How was it used in political campaigns : How did The War on Drugs affect the economic collapse of inner-city communities? How was it used in political campaigns?
Analyze the 2009 debate over the healthcare public option : At the end of Chapter 9 there is a Bonus Exercise that asks you to research and analyze the 2009 debate over the healthcare public option.
Identify the fatty acids that raise the risk for cvd : Identify the fatty acids that raise the risk for CVD and explain their role(s) promoting this disease. In what foods are these fatty acids found?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Demonstrable experience with linux operating systems

Demonstrable experience with Linux Operating Systems (Ubuntu, CentOS, RedHat or AWS Linux) Experience creating and maintaining containers in a Docker/Kubernetes

  Write a function definition for a function called even

Write a function definition for a function called even that takes one argument of type int and returns a bool value.

  Review case studies based on erm and risk

Chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors want.

  Write a matlab program that rolls a fair 10-sided dice

Write a MATLAB program that rolls a fair 10-sided dice (whose faces go from 0 to 10) for some given number of times.

  It will calculate the additional amount of sales that each

modifynbspthe week three javatm application using javatm netbeanstm ide to meet these additional and changed business

  Write a python function extractalignment

Write a Python function extractAlignment(S) that takes in as an input a matrix S, of dynamic length nx by ny .

  What is the value of x

Assume that a vector processor operates 20 times faster on vector code than scalar code. If only x% of the program is vectorizable, what is the value of x.

  Write a program outputs the number of milk

Write a program that does the subsequent for 50 liters of milk produced in the morning - The cost of producing one liter of milk is $0.58, cost of each carton itself is $0.25 and the sale price on each carton of milk is $3.99.

  Do research online on how to write or structure

how to write or structure/format a business letter and share at least one link in class. Discuss what you learned in your research and share the topic

  Describe the three goals of cryptography

Describe the three goals of cryptography, Draw a table showing if hashing and data signature meet the goals of cryptography

  What are the risks of poor security in healthcare it systems

What are some of the risks of poor security in healthcare IT systems? How would you feel if your medical history was illegally accessed?

  What is the keyspace of the one-time pad for a ciphertext

Suppose you wish to encrypt the messsge BEYONCE using the one time pad with the key RIHANNA.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd