Pick an ethical issue rooted in cybertechnology

Assignment Help Computer Network Security
Reference no: EM132161883

Ethics & the Information Age Project

1. Pick an ethical issue rooted in cybertechnology that interests you.

2. Create an annotated outline which lays-out your topic, thesis, and analytical process, including premises. This must be clear and complete. This outline should be well organized; include APA citations(reputable sources); and persuasive.

3. Create a video (3 - 5 minutes in length). You've seen some interesting videos this semester, use those ideas to let your creativity fly! Your video should:
o Clearly define your ethical dilemma
o Clearly use deontology, utilitarianism or just consequentialism to analyze a positive ethical outcome. (This should guide your project).
o Your analysis should be summarized but efective. (Target audience = society, likely not very well-versed in ethical analysis).

Deliverable:
- An outline
- A video
- Fully prepared copyright application (you may in the alternative, explore licensing through Creative Commons or Copyleft).
- Your presentation to the class (6 - 10 minutes) will explain why you chose the topic, why you chose your theory(ies), and what you learned from this assignment. Think of this like your "elevator speech." You will present this to your peers in class.(Target audience = classmates/fellow ethicists). You will then show your video.

Further Instructions:
1. Apply for copyright to protect the intellectual property of your video. Learn what you would need to do in order to copyright your work. you are not expected to actually submit your application. You may also investigate Copy Left and Creative Commons.

2. Remember: any resources must be properly cited in your annotated outline and/or your reference in your YouTube and PPT.

Video Making Resources
As you prepare for theProject, you may benefit from a list of video making resources. Depending on the software you have, or may want to purchase, or get for free there are a few options. You are not required to obtain or purchase anything! A non-exclusive list below and feel free to add a resources not included below:

3. PoWToons
4. Animoto
5. Flipagram
6. Musicly
7. Triller
8. Adobe Spark

Attachment:- Project.rar

Verified Expert

Ethical principles that govern a person’s behavior are a critical part of any sound Cybersecurity defense strategy. Without clear ethical standards and rules, Cybersecurity professionals are almost indistinguishable from the black-hat criminals against whom they seek to protect systems and data. The study of Cybersecurity ethics, which encompasses a wide array of approaches and schools of thought, does not offer a simple solution to the many complex ethical dilemmas IT professionals, chief information security officers (CISOs) and organizations face on a daily basis. This paper describes ethical challenges in Cybersecurity and is written in Microsoft Word Document File.

Reference no: EM132161883

Questions Cloud

Program that functions as a simple boolean calculator : Create a program that functions as a simple Boolean calculator for 32 bit integers. It should display a menu that asks the user to make a selection
What did the monroe doctrine declare : What did the Monroe Doctrine declare? The Congress of Vienna led to what agreement?
How do you express the values in your professional life : Identify three to five personal values or characteristics that you believe are critical components of a good leader, such as honesty, compassion, or fairness.
Consensus algorithm for a blockchain of choice : Please discuss which one will you select as the most suitable consensus algorithm for a blockchain of your choice? And why?
Pick an ethical issue rooted in cybertechnology : Create an annotated outline which lays-out your topic, thesis, and analytical process, including premises. This must be clear and complete
Measures based on performance in current job : What is the advantage of using measures based on potential for future jobs? What is the advantage of using measures based on performance in the current job?
Optimistic or pessimistic stance : Comment on whether we should consider this an "optimistic" or "pessimistic" stance.
Describe an interaction or decision point : Describe an interaction or decision point this semester in which your nurse leader demonstrated humility or a missed opportunity to promote the success.
Determine the amount to be capitalized in an asset account : Southwest Milling Co. purchased a front-end loader to move stacks of lumber. Determine the amount to be capitalized in an asset account for purchase of loader

Reviews

Write a Review

Computer Network Security Questions & Answers

  What steps you will take if your network has been hacked

Explain what steps you will take if you discover your network has been hacked. Your paper should be AT LEAEST A 1,000 words OF CONTENT and should include citations

  What types of information could be used

What types of information could be used? What does this use suggest to you about the content and detail of such information?

  How to protect your system from mobile code attack

Discuss common forms of Mobile Code, potential vulnerabilities and how to protect your system from Mobile Code attack.

  Extract the password hashes from a machine

Extract the password hashes from a machine

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  Explain the network diagram for pureland wastewater

This assignment requires you to explain the network diagram for PureLand Wastewater and make specific recommendations to improve network security.

  Define ethical issues related to information technology

Locate a news article based on a recent event on ethical issues related to information technology. For example, Wikileaks, Snowden, etc.

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  How can we identify security risks and assess their levels

So, how can we identify security risks, assess their levels, implement appropriate tests and other controls, and report security test results based on risk?

  Recognize all the potential security threats on a personal

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Article on wireless hacking

Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT change so rapidly, your article should be no older than 2007.

  What methods or facilities are available to secure data

What methods/facilities are available to secure data in today's systems? Have these methods proved to be adequate? If not, what changes would you recommend to make these methods more secure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd