Identify a recent moral dilemma or ethically questionable

Assignment Help Basic Computer Science
Reference no: EM1378252 , Length: 1500 words

Task

Proceed according to the following instructions.

1. Identify a recent (within the last six (6) months) moral dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.

  • If using a workplace example, to maintain confidentiality, do not use real names.
  • If you use a media article you must include a copy of the media article in the Appendix of your assignment.

2. Undertake further research about your chosen topic to assist you in analysing and discussing it in your essay.

3. You are required to complete two separate analyses of the ethical dilemma you have identified above.

The components of the assignment are:

  • Analysis One - use the Doing Ethics Technique (DET), ensuring you address each of the DET questions; and
  • Analysis Two - Use the Australian Computer Society Code of Professional Conduct (or similar), relating specific clauses from this code to the ethical issue/s, you have identified.

4. Write an Overall Conclusion that ties the results of both Analysis One and Analysis Two together and which justifies the recommendations you have made through the two analyses.

5. Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.

Reference no: EM1378252

Questions Cloud

When determining if there was nearby cause foreseeability : When determining if there was nearby cause the foreseeability of the harm caused will be examined. Mens Rea mentions to the mental state necessary for a court to find criminal liability.
Portrayal of an ethical organization noises like the perfect : Your portrayal of an ethical organization noises like the perfect environment in which to work. You recognised that leadership in an organization that practices ethics sows trust and in return
Evaluating employee training : As the training manager, you are making to interview many consultants who may give training services to your company. One of the targets for the interview is to find out how the training will be evaluated and validated.
Briefly define how you would approach this conversation : As an HR expert you may have to have tough conversations with employees as well as possibly even terminate someone. Briefly define how you would approach this conversation with an employee.
Identify a recent moral dilemma or ethically questionable : Identify a recent moral dilemma or ethically questionable situation relating to ICT - use the Doing Ethics Technique (DET), ensuring you address each of the DET questions;
Identify and explain three selection tools : Discuss the skills and competencies needed for a successful consultant and use at least two-sources to support your analysis.
What does ritzer mean by starbuckization : What does Ritzer mean by Starbuckization? Why could Starbuckization seem more reliable with a postmodern theoretical viewpoint than a modern theoretical perspective?
Quantity tends to develop a surrogate for quality : Quantity tends to develop a surrogate for quality. Calculability is clearly linked to irrationality since amongst other things the emphasis on quantity tends to affect quality adversely.
Discuss different problems in an organization : Discuss and explain at least three different problems in an organization can have that would require interventions and with the rationale for each and use at least two sources to support your assessment.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining models in system analysis and design

In System Analysis and Design: Models are widely used in wide variety of technical occupations beyond information technology.

  Create an incident-response policy

Create an incident-response policy that covers the development of incident-response team, disaster-recovery processes, and business-continuity planning.

  Development of enterprise architecture-existing it resources

Discuss what concepts are important to share during this presentation in particular. Also discuss, in general, the relationship between development of enterprise architecture and existing IT resources and processes.

  Explain data by state of computer-s electrical switches

Differentiate between computer data represented by the state of computer's electrical switches and meaningful information which is displayed to user.

  Explaining mandatory access control implementation

How are Novell AppArmor and the Red Hat "targeted" SELinux policy similar? Is either a true Mandatory Access Control implementation. If not, explain why.

  Explain business scenario and specify types of constraints

Explain a business scenario and specify the types of constraints that would be appropriate to make sure the integrity of the database. For example, an airline reservation system should not make a reservation.

  Deliver software to a schedule

You are asked by your manager to deliver software to a schedule that you know can only be met by asking your project team to work unpaid overtime.

  Explain applications of pervasive computing

Which of the applications of pervasive computing do you believe are probable to gain greatest market acceptance over next few years? Why?

  Standard analog-to-digital sampling rate in synchronous time

Iif synchronous time division multiplexing is used, along with standard analog-to-digital sampling rate, and each sample is converted into 8-bit value?

  Dscribe implications of e-publishing they effect way we read

Dscribe implications of e-publishing as they effect way we read and understand content. Describe e-books, print on demand, copyright and XrML and use of multimedia.

  Factoring is the problem of computing

Consider the one time pad encryption scheme to encrypt a 1-bit message. Replace the XOR operation with another operation X. For which X does the resulting scheme satisfy perfect secrecy?

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd