Workplace example, to maintain confidentiality

Assignment Help Basic Computer Science
Reference no: EM13936403

Task

Proceed according to the following instructions.

1. Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.
a. If using a workplace example, to maintain confidentiality, do not use real names.
b. If you use a media article you must include the link to the media article in the references list of your assignment.

2. Undertake further research about your chosen case to assist you in analysing and discussing it in your essay

3. You are required to analyse the ethical dilemma you have identified above using use the Doing Ethics Technique (DET). The word limit is 700 words ± 10%. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.

4. Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least TWO (2) quality academic references from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, the DET, Tavani, the Interact subject lecture notes etc BUT these references cannot be used as one of your two quality references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

Reference no: EM13936403

Questions Cloud

What are the number of contracts needed to implement hedge : The size of each three-month futures contract is 250 shares. The current price of Stock 2 is $45 and at time T it is $43.9 per share. What are the number of contracts needed to implement this hedge?
What can you infer about whether it is likely out-of-money : What is the delta for this option and what can you infer about whether it is more likely in- or out-of-the-money? How much would you need to borrow to establish a replicating portfolio for the call option?
Briefly describe mandatory release and good-time release : Briefly describe mandatory release and good-time release. Describe one (1) way inmates receive/apply good-time credit to their release. Is this process is beneficial to the criminal justice system as a whole? Provide one (1) supporting fact to justi..
Estimate that anheuser-buschs brand equity : There is no significant discussion in the InBev article about the tangible assets in play, but Simon and Sullivan's Measured Brand Equity for Food Product Companies (an alternative to Interbrand's valuation method) estimates that Anheuser-Busch's ..
Workplace example, to maintain confidentiality : Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or onl..
How should borrower be thinking about the loan commitment : From a financial instrument perspective, how should the borrower be thinking about this loan commitment? What risk do they face and what estimate can be placed on this risk using the information given above?
What array positions are part of the free space list : What elements are in the list pointed to by list1?What elements are in the list pointed to by list2?
Identify and analyze legal issues : Identify and analyze legal issues and to make recommendations based on the provided scenario. Discuss in detail the basis of any challenges to Section. D that any of the parties may have, and evaluate their chances for success
How could you still implement your strategy : Using only what you know in the information provided above, how could you still implement your strategy? What is this called? What is the price you would pay for this?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd