Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13903043

Paper B1-Privacy-Related Matrix (12%)

This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Report - at: https://epic.org/reports/ See List on left: HOT POLICY ISSUES

and/or: https://www.eff.org/issues/privacy [see list at right on this page]

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical issue and how this issue is affected by laws, regulations, and policies.

Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

  1. Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix:

Why I chose the dilemma;

Why I chose the three principles; and

An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Submit the matrix for grading in your Assignments Folder.  
  2. Indicate appropriate APA reference citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2 below. The issue identified in this assignment will be used in B 2 Assignment.  Make sure you read the B2 assignment below so that you understand the relationship prior to starting B1.

Normative Ethics List

Autonomy: the duty to maximize the individual's right to make his or her own decisions.

Beneficence: the duty to do good both individually and for all.

Confidentiality: the duty to respect privacy of information and action.

Equality: the duty to view all people as moral equals.

Finality: the duty to take action that may override the demands of law, religion, and social customs.

Justice: the duty to treat all fairly, distributing the risks and benefits equally.

Non-maleficence: the duty to cause no harm, both individually and for all.

Understanding/Tolerance: the duty to understand and to accept other view points if reason dictates doing so is warranted.

Publicity: the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: the duty to tell the truth.

Ethical Dilemma Matrix:

Ethical dilemma:

Stakeholders

1

2

3

4

Step 1:  Identify the ethical dilemma based on one of the broad categories identified. An example (following here) might be to falsify your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc.  Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3:  Choose any three of the principles that might apply such as autonomy, publicity, and veracity.

Step 4: identify how the dilemma affect each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

See example, next page-
For example:

Ethical dilemma: falsifying  your profile on a social networking site

Stakeholders

Autonomy

Publicity

Veracity

1: You

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2:Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

4

 

Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf

 

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%)

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. 

The following elements must be addressed:

  1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies/computer.php
  1. Your policy should include the following major headings:

Overview of policy

Purpose

Scope (roles and responsibilities of stakeholders)

 Policy/Procedures to follow

Sanctions/Enforcement

  1. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.
  2. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use.
  3. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  4. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM13903043

Questions Cloud

Determine the optimal order quantity per order : A firm is faced with the attractive situation in which it can obtain immediate delivery of an item it stocks for retail sale. The firm has therefore not bothered to order the item in any systematic way. Demand for the item is reasonably constant over..
Design process : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..
Record the sale by balus company : Record the sale by Balus Company of $ 125,000 in accounts receivable
Explain the general aviation revitalization act : You are the Vice President of Risk Management for the newly formed Lake Cherokee Aircraft Company. The company president asks you to explain the General Aviation Revitalization Act (GARA) to her.
Privacy-related matrix : This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating t..
Describe the ownership of the country''s media : Detail the ownership of the country's media
Property management agreement with andrew hoganmuller : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated. Was this a legal contract? If it is an illegal contract, is it void or voidable in whole or in part? ..
What was total conversion cost incurred during the period : The ending inventory represented 2,000 equivalent units of work this period. What was the total conversion cost incurred during this period?
Cipher operation paper : How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The program should contain a function with one of its

write a program that reads a string and outputs the number of times each lowercase vowel appears in it. the program

  Write the student info and processed data

Implement the following algorithm in C# using WFA GUI. Write the student info and processed data (student name, exams, avg and grade and ...) to student database

  Pricing in one market depends on sales

12. A firm makes two products, x and y. Inverse demand for each shows that pricing in one market depends on sales in the other according to the equation:Px=1000 - 20x + 3y and Py = 500 - 5y + x.The firm faces joint fixed cost of $12,000 and constant ..

  Activities the overhead of using the services

While the staff agree and can see how the new untethered access to business data and services can help in their day to day activities the overhead of using the services due to authentication has made the system poorly accepted.

  Create direct-mapped data cache for the byte offset

Create the 128KB direct-mapped data cache which uses a 32 bit address and 16 bytes per block. Compute the following: How many bits are utilized for the byte offset?

  Database management systems

Database Management Systems

  Prepare for the final presentation to the pvss management

Prepare for the final presentation to the PVSS management team on your information systems audit, you want to ensure that they accept it and understand your role as the certifying agent.

  Address-based authentication works

Explain how address-based authentication works. Is this a secure authentication technique? Why or why not?

  Discuss how automated cybersecurity tools

1. Prevent, Detect, and Respond to Cyber Attacks Discuss how automated cybersecurity tools can support operations personnel as they attempt to prevent, detect, and respond to cyber-attacks against a company's networks and information systems.

  Acme films produces advertisements for cable television

Acme Films produces advertisements for cable television stations. They have two locations in a large metropolitan area. Building 1 contains the administrative, sales, marketing, human resources, development, and graphics departments

  An engineering company has a policy

An engineering company has a policy that its end users should never make changes to the system Registry or perform hardware repairs of any kind on their office workstations. Do you think this policy is a good one? Discuss the pros and cons of this po..

  The cost of painting and installing carpet

Write an algorithm (in Pseudocode) for a program that computes the cost of painting and installing carpet in a room. Assume the room has one door, one windows and one bookshelf (built into the wall and not painted). Your program should do the foll..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd