Limitations of ethical dilemma, Computer Network Security

Assignment Help:

The best results obtained in the PIIT classes have been when the technique has been used in tutorial groups, rather than have students submit individual reflections on particular cases. Individual reflection yields significant results and students have voiced their delight at being able to work through difficult situations using this technique, but even so, further insights and better solutions are derived when it is used in a group situation. Solving scenarios collaboratively also adds credibility to the process, in that much of the professional development takes place in multidisciplinary teams. And that creates new a problem - which ethical standard should one adopt? In multidisciplinary teams, professionals often belong to different professional societies, each with similar, but not identical, codes of ethics. In a student context this leads to interesting discussions, in a professional setting it may lead to conflicting standards that are difficult to resolve.

Another limitation is objectivity. One advantage of thinking through cases, such as those below, before being confronted with real situations, is that it becomes easier to be objective. When confronted with an ethical dilemma in real life, subjectivity can prevent one from being able to make the most appropriate judgments. This is where reference to one's peers, co-workers or members of one's professional society can be helpful. Such people can use this technique to work objectively through the issues and advise the person in the situation of the most appropriate course of action


Related Discussions:- Limitations of ethical dilemma

Ids deployment overview, IDS Deployment Overview The decision regarding ...

IDS Deployment Overview The decision regarding control strategies, decisions about where to locate elements of intrusion detection systems is an art in itself. Planners should s

Object tracking using wireless sensor networks, This project involves the d...

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Calculate the minimum required signal strength, Question 1: (a) (i) Ra...

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

Describe the process of components identification, Probelm 1: Give the ...

Probelm 1: Give the History and Evolution of Wireless Communication System. Complete explanation Probelm 2: Describe the process of Components Identification and cal

Computer adaptive test, Project Name : Computer Adaptive Test Role ...

Project Name : Computer Adaptive Test Role : Day to Day interaction with Client. Involved in Requirement Gathering, Estimation.Involved with Stellent design and architectur

Explain belady''s anomaly, Belady's Anomaly Also known FIFO anomaly. G...

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Packets and frames, PACKETS: Packet is a generic word that define to sma...

PACKETS: Packet is a generic word that define to small code of data. Packet have different format. Each hardware needs different packet format.  FRAME: A hardware frame or

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd