Identify ethical issues related to ICT

Assignment Help Management Information Sys
Reference no: EM132128570 , Length: 2200 Words

Topics in Information Technology Ethics Assignment -

Learning outcomes - On successful completion of this subject, you should:

  • be able to identify ethical issues related to ICT;
  • be able to assess the implications of ethical problems;
  • be able to critically evaluate solutions to ethical problems;
  • be able to apply ethical theories to ethical problems;
  • be able to argue consistently and rationally about the moral issues raised by the adoption and use of ICT;
  • be able to analyse ethical problems from the point of view of ICT professionals using the Australian Computer Society (ACS) Code of Ethics;
  • be able to analyse ethical situations using critical thinking techniques.

Assessment item 1 - Doing Ethics Technique

Task - Proceed according to the following instructions.

1. Identify an ethical dilemma or ethically questionable situation from ONE of the following four YouTube videos:

Video1: A dilemma in IT: Select action end of video and see its consequence

Video2: Scenario 1 Overseas Codeshop

Video3: Scenario 2: Development Methodology

Video4: Scenario 3: Early Launch

Please include the link to the video in the references list of your assignment.

2. Undertake further research about the ethical issues you identified in your chosen video to assist you in analysing and discussing it in your essay.

3. You are required to analyse the ethical dilemma you have identified above using the Doing Ethics Technique (DET). The word limit should be between 900-1000 words. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicates in brackets the word count of your assignment excluding those items mentioned above.

4. Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least TWO (2) quality academic references from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, the DET, Tavani, the Interact subject lecture notes etc BUT these references cannot be used as one of your two quality academic references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

Rationale - This assessment aligns with the following subject learning outcomes:

  • be able to identify ethical issues related to ICT;
  • be able to assess the implications of ethical problems;
  • be able to critically evaluate solutions to ethical problems;
  • be able to apply ethical theories to ethical problems;
  • be able to argue consistently and rationally about the moral issues raised by the adoption and use of ICT.

Assessment item 2 - Applying Ethical Theory

Task - Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.

Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.

Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.

You are required to complete the following:

Write an essay:

The for the essay is 1200-1300 words. Headings, citations and references do not word limit count towards the word limit, but quotations do.

Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well reasoned arguments for your assessments and recommendations.

Write an overall conclusion that justifies your recommendations made in your essay.

Include a list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.

In ICT, the main ethical issues are taken to be:

ICT professionalism

Privacy

Security

Cyber-crime

Intellectual property

Regulation on the internet

Social inclusion

Community and identity

Pervasive and convergent computing.

The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:

  • identify an ICT-related ethical issue from a media article or case study;
  • apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
  • derive logical and justifiable conclusions to resolve the ethical issue(s);and, apply proper academic referencing.

Attachment:- Assignment File.rar

Reference no: EM132128570

Questions Cloud

Describe the organization you have chose : Identify an organization of your choice. This could be your current employer. It could even be a hypothetical organization or that of one of your peers.
Contrast of trompenaars and globe cultural models : Compare/Contrast of Trompenaars and Globe cultural models. Compare/Contrast of Hofstede and Trompenaars cultural models.
Information to the three different audiences : Describe the 3 different ways you would communicate this information to the 3 different audiences (name them).
Create draft aggregate plan to staff night-time call cent : You are working with large set of temporary workers to create ‘draft’ aggregate plan to staff a night-time call center for your company.
Identify ethical issues related to ICT : ITC506 - Topics in Information Technology Ethics Assignment, Charles Sturt University, Australia. Identify ethical issues related to ICT
What is strategy-critical role in communication matter : What is strategy and how can a critical role in communication matter? How important is the ability to communicate in strategy by way of fun and also effective?
Compute dollar value of the impact of policy on employers : Compute the dollar value of the impact of the policy on employers, workers, and society as a whole.
Explain how multi-factor authentication can greatly reduce : Explain how multi-factor authentication can greatly reduce security breaches in high security situations such as bank accounts.
Recommend motivating an age-diverse workforce : How would you recommend motivating an age-diverse workforce?

Reviews

len2128570

10/2/2018 12:42:54 AM

Pass Requirements - A student must obtain at least 50% in both the examination and the total mark in order to pass this subject. To be eligible for the grade AA or AE you must have submitted all assessment items in the subject, including the final exam. If you choose not to complete an assessment item or do not sit the final exam then you will not be granted an AA or an AE grade. NOTE: Please use the template provided in resources section of subject site.

len2128570

10/2/2018 12:42:48 AM

Answers all DET questions, lists all the facts, identifies all the non-ethical issues, lists all the stakeholders, identifies all the ethical issues, evaluates OTHER options can resolve them and selects the best option from these and the already given and justifies why this option is the best using supporting arguments based on the literature. Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors. Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.

len2128570

10/2/2018 12:42:42 AM

This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives. In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate. Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.

len2128570

10/2/2018 12:42:34 AM

Demonstrates an excellent ability at applying ethical theories to the ethical issues. Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors. Superior conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.

Write a Review

Management Information Sys Questions & Answers

  Briefly explain that how the four mechanism are integrated

Briefly explain that how the four mechanism are integrated with the Emerging Technologies. Give Examples.

  The topic of managerial issues of a networked organization

Research at least two articles on the topic of managerial issues of a networked organization. Write a brief synthesis and summary of the two articles.

  Discuss the walmart case study introduced in bourgeois

Discuss the Walmart case study introduced in Bourgeois' e-book about how that company used information systems.

  Create a list of stakeholders for the ir planning committee

Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee.

  Create a spreadsheet to capture the financial components

Create a Spreadsheet to capture the financial components involved in the plan. Please be sure to cover all the items you included in your memo.

  Where dada mining is crucial to the success of a business

Present an example where dada mining is crucial to the success of a business. What data mining is functions does this business need?Can they be performed alternatively by data query processing or simple statistical analysis?

  Explain what is meant by denial of service

Explain what is meant by denial of service and provide an example to support your answer. Explain what is meant by security policy and describe the basic information that a security policy must stipulate.

  Demonstrate an immediate application

Approach your topic as though you were arguing for funding that might support a vital new step in understanding e-commerce information systems.

  Legal and technical challenges and issues

From the e-Activity, determine some of the legal and technical challenges and issues with the implementation of CIPA

  Which of the theses do you see as the most hopeful

Do you believe that more technology, for example virtual worlds, can solve the problem of alienation that technology helped to create in the first place? Why or why not? Is there a solution to this problem? Do you have any experience with virtua..

  Describe a recovery that would not be feasible to test

Describe a recovery that would not be feasible to test with a real-world test. Include the reason(s) that the real-world test could not be done. Elaborate on the steps and processes you would have to do to try to insure that your recovery plan wou..

  Provide recommendation for addressing data center limitation

Recently, Oza Corporation, a local Denver-based mobile phone service provider, announced plans to expand its business operations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd