Identify the technical or professional problem in the case

Assignment Help Computer Engineering
Reference no: EM133472868

Homework: Computer Science

Question A. Get the facts straight. Review the case. Briefly recap the details of the case at the beginning of your paper.

Question B. Identify the central stakeholders in the case. Identify 6 stakeholders then narrow your analysis down to 3.

Question C. Identify the technical/professional problem in the case.

Question D. Identify the Ethical problem or problems in the case.

Question E. Solve the technical and ethical problems using both technical and Ethical standards. Analyze the case from 3 perspectives, use 1 ethical principle for each perspective. In Addition you must now also apply 3 principles from the ACM code of ethics in your analysis. 1 principle should be applied for each of the 3 stakeholder perspectives you analyze. You are now applying 6 ethical principles in your analysis, 3 philosophical ethical principles and 3 principles from the code of ethics.

Question F. Will your solution to the problem withstand criticism from the perspectives of both a variety of Ethical principles and Professionals in your field?

Question G. What recommendations can you make about the problems in the case based upon your ethical analysis?

When you construct your analysis be sure and remember that we are assigning 3 to 4 pages analysis. With this length limitation it is important to realize that you will probably only be able to look at the problems in the case from three stakeholder perspectives. If you try to analyze every stakeholder perspective you will probably exceed the length limitation.

Reference no: EM133472868

Questions Cloud

Limited liability business forms are generally created : Limited liability business forms are generally created by the government.
Discuss or worry about emergency rules : Is the rule by the FDA valid? Why or why not? In your answer, don't discuss or worry about "emergency rules", but just stick to what we have learned.
What are the implications of an attack on bgp : What types of attacks is Border Gateway Protocol (BGP) susceptible to? What are the implications of an attack on BGP? What might be disrupted?
Identify non profit formation and maintenance statutes, : Identify non profit formation and maintenance statutes, regulations, and agency guidance in the state of Hawaii.
Identify the technical or professional problem in the case : Identify the technical/professional problem in the case. What recommendations can you make about the problems in the case based upon your ethical analysis?
What wage and work hour protections exist for employees : What wage and work hour protections exist for employees today? Identify and explain at least three and provide which you believe is most important and why.
Identify the purpose of the current u.s. hcds : Identify the purpose of the current U.S. HCDS - Describe the population served by the U.S. HCDS - Discuss the projected healthcare needs of the U.S.
Develop data collection form for an oncologic clinical data : Develop a data collection form for an oncologic clinical data registry that is no more than two pages long.
Private security in crime prevention : Describe how law enforcement can work with private security in crime prevention and responding to threats or incidents of terrorism?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd