Proceed according to the following instructionsidentify a

Assignment Help Computer Engineering
Reference no: EM13380339

Proceed according to the following instructions.

Identify a recent (within the last six (6) months) moral dilemma or ethically questionable situation relating to ICT that you are familiar with.

This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.

If using a workplace example, to maintain confidentiality,do not use real names.

If you use a media article you must include a copy of the media article in the Appendix of your assignment.

Undertake further research about your chosen topic to assist you in analysing and discussing it in your essay.

The components of the assignment are:

Analysis One- use the Doing Ethics Technique (DET), ensuring you address each of the DET questions;and

Analysis Two- Use the Australian Computer Society Code of Professional Conduct(or similar), relating specific clauses from this code to the ethical issue/s, you have identified.

Write an Overall Conclusion that ties the results of both Analysis One and Analysis Two together and which justifies the recommendations you have made through the two analyses.

Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at leastfive (5)qualityreferences from different sources. Please note that these five references are in addition to those provided to you through this subject (for example, you still must reference, the DET, the ACS code, Tavani, the Interact subject lecture notes etcBUTthese referencescannotbe used as one of your five quality references from different sources). Only use references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

Reference no: EM13380339

Questions Cloud

The australian commonwealth government has developed a : the australian commonwealth government has developed a cloud computing strategy and cloud computing policy and you as
You have no guarantees about the accuracy of the input from : you have no guarantees about the accuracy of the input from the user. you have to check all input and give helpful
Write a program called a2p1 to run in the lc-3 simulator : write a program called a2p1 to run in the lc-3 simulator. the program asks for the user to type in his or her upi. then
Part 1 you will implement a program where the computer : part 1 you will implement a program where the computer plays against a human opponent. the game will start with a
Proceed according to the following instructionsidentify a : proceed according to the following instructions.identify a recent within the last six 6 months moral dilemma or
Consider the relational schema of part of a firm database : consider the relational schema of part of a firm database below. write a sql query for each of the following
1decryption speeda certain cryptography vendor was : 1.decryption speeda certain cryptography vendor was providing an encryption technology that was breakable within 10
You have been hired as an information systems consultant to : you have been hired as an information systems consultant to examine state health centre a fictitious multi-centre state
Noticethatcorporatemanagementhasinthisexampleidentifiedandde : noticethatcorporatemanagementhasinthisexampleidentifiedanddevelopedtheconceptofaswellasdefinedtherequirementstaskmandate

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd