Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13903043

Paper B1-Privacy-Related Matrix (12%)

This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Report - at: https://epic.org/reports/ See List on left: HOT POLICY ISSUES

and/or: https://www.eff.org/issues/privacy [see list at right on this page]

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical issue and how this issue is affected by laws, regulations, and policies.

Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

  1. Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix:

Why I chose the dilemma;

Why I chose the three principles; and

An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Submit the matrix for grading in your Assignments Folder.  
  2. Indicate appropriate APA reference citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2 below. The issue identified in this assignment will be used in B 2 Assignment.  Make sure you read the B2 assignment below so that you understand the relationship prior to starting B1.

Normative Ethics List

Autonomy: the duty to maximize the individual's right to make his or her own decisions.

Beneficence: the duty to do good both individually and for all.

Confidentiality: the duty to respect privacy of information and action.

Equality: the duty to view all people as moral equals.

Finality: the duty to take action that may override the demands of law, religion, and social customs.

Justice: the duty to treat all fairly, distributing the risks and benefits equally.

Non-maleficence: the duty to cause no harm, both individually and for all.

Understanding/Tolerance: the duty to understand and to accept other view points if reason dictates doing so is warranted.

Publicity: the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: the duty to tell the truth.

Ethical Dilemma Matrix:

Ethical dilemma:

Stakeholders

1

2

3

4

Step 1:  Identify the ethical dilemma based on one of the broad categories identified. An example (following here) might be to falsify your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc.  Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3:  Choose any three of the principles that might apply such as autonomy, publicity, and veracity.

Step 4: identify how the dilemma affect each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

See example, next page-
For example:

Ethical dilemma: falsifying  your profile on a social networking site

Stakeholders

Autonomy

Publicity

Veracity

1: You

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2:Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

4

 

Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf

 

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%)

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. 

The following elements must be addressed:

  1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies/computer.php
  1. Your policy should include the following major headings:

Overview of policy

Purpose

Scope (roles and responsibilities of stakeholders)

 Policy/Procedures to follow

Sanctions/Enforcement

  1. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.
  2. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use.
  3. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  4. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM13903043

Questions Cloud

Determine the optimal order quantity per order : A firm is faced with the attractive situation in which it can obtain immediate delivery of an item it stocks for retail sale. The firm has therefore not bothered to order the item in any systematic way. Demand for the item is reasonably constant over..
Design process : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..
Record the sale by balus company : Record the sale by Balus Company of $ 125,000 in accounts receivable
Explain the general aviation revitalization act : You are the Vice President of Risk Management for the newly formed Lake Cherokee Aircraft Company. The company president asks you to explain the General Aviation Revitalization Act (GARA) to her.
Privacy-related matrix : This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating t..
Describe the ownership of the country''s media : Detail the ownership of the country's media
Property management agreement with andrew hoganmuller : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated. Was this a legal contract? If it is an illegal contract, is it void or voidable in whole or in part? ..
What was total conversion cost incurred during the period : The ending inventory represented 2,000 equivalent units of work this period. What was the total conversion cost incurred during this period?
Cipher operation paper : How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create a pseudo code users allow

Please create a pseudo code that would allow users to enter and submit survey (to store in the database) and display survey results of total entered surveyed

  Design a simple network monitoring system

In this assignment, you are going to design a simple network monitoring system that is suitable for a small business.

  Use ethernet network data link protocols

Is possible to use Ethernet network data link protocols on a Token Ring network? Explain why or why not.

  Is it beneficial to give young children with computers

After reading information under heading Statuses, explain and provide the example of each of the following as each applies to you and your life.

  The key desirable characteristics is robustness

Regardless of the operating system used, from MS-DOS to Macintosh OS X, from Windows to Linux, to OS/400, one of the key desirable characteristics is robustness of the operating system.

  Information related to configuration management

Write a 700- to 1,050-word paper discussing managerial issues associated with managing an organization's IS infrastructure. Include the following: Information related to configuration management and preventative maintenance Industry standards in ..

  Explain the working and details of the protocol clearly

Pick any one cryptographic protocol (e.g., SSL, TLS, IKE, Kerberos, SSH, PPTP, WEP, WPA, TKIP etc.). In your initial discussion post, please explain the working and details of the protocol clearly (no copy+paste). Wikipedia is not acceptable. When re..

  Computers on the internet have an assigned address

Computers on the Internet have an assigned address (location) called its Uniform Resource Locator (URL). The URL is used to identify one computer to the other computers on the Internet.

  Sketch hierarchy chart and draw logic for program

Sketch the hierarchy chart and draw the logic for program which comprises housekeeping, detail loop and end-of-job modules and which computes service charge customers.

  How many different committee choices are possible

A committee of 5 people must be chosen from a group of 7 men and 9 women. If the committee is required to have at least 1 woman, how many different committee choices are possible?

  Examples of the three types of cost estimates

Describe and present real world examples of the three types of cost estimates and where you would find them in the context of the PMBOK process groups

  Identify five different it systems

Identify five different IT systems that have affected business in the past few years

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd