Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13903823

Paper B1-Privacy-Related Matrix (12%)

This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Report - at: https://epic.org/reports/ See List on left: HOT POLICY ISSUES

and/or: https://www.eff.org/issues/privacy [see list at right on this page]

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

 

Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical issue and how this issue is affected by laws, regulations, and policies.

Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

  1. Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix:

Why I chose the dilemma;

Why I chose the three principles; and

An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Submit the matrix for grading in your Assignments Folder.  
  2. Indicate appropriate APA reference citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2 below. The issue identified in this assignment will be used in B 2 Assignment.  Make sure you read the B2 assignment below so that you understand the relationship prior to starting B1.

Normative Ethics List

Autonomy: the duty to maximize the individual's right to make his or her own decisions.

Beneficence: the duty to do good both individually and for all.

Confidentiality: the duty to respect privacy of information and action.

Equality: the duty to view all people as moral equals.

Finality: the duty to take action that may override the demands of law, religion, and social customs.

Justice: the duty to treat all fairly, distributing the risks and benefits equally.

Non-maleficence: the duty to cause no harm, both individually and for all.

Understanding/Tolerance: the duty to understand and to accept other view points if reason dictates doing so is warranted.

Publicity: the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: the duty to tell the truth.

 

Ethical Dilemma Matrix:

Ethical dilemma:

Stakeholders

1

2

3

4

Step 1:  Identify the ethical dilemma based on one of the broad categories identified. An example (following here) might be to falsify your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc.  Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3:  Choose any three of the principles that might apply such as autonomy, publicity, and veracity.

Step 4: identify how the dilemma affect each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

See example, next page-
For example:

Ethical dilemma: falsifying  your profile on a social networking site

Stakeholders

Autonomy

Publicity

Veracity

1: You

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2:Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

4

Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%)

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. 

The following elements must be addressed:

  1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies/computer.php
  1. Your policy should include the following major headings:

Overview of policy

Purpose

Scope (roles and responsibilities of stakeholders)

 Policy/Procedures to follow

Sanctions/Enforcement

  1. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.
  2. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use.
  3. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  4. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM13903823

Questions Cloud

Is utilization in this mhmr similar or different than state : Write a brief conclusion statement summarizing your results. What can you tell this MHMR about the kinds of clients that use this facility? Is utilization in this MHMR similar or different than the state? What type of patient is the most frequent ..
Why is it possible to change real economic factors : Why is it possible to change real economic factors in the short run simply by printing and distributing more money? Explain why a stable 5% inflation rate can be preferable to one that averages 4% but varies between 1-7% regularly.
Discuss the impacts of globalization : Discuss the impacts of Globalization, Neoliberalism and Internationalization in Global Sustainable Development.
Design process : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..
Privacy-related matrix : An opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and t..
Evaluate the definite integral of this function : According to its Web site, "SpeedOf.Me is an HTML5 Internet speed test. Evaluate the definite integral of this function over the interval [0,1]. Interpret your result from #4 above. Make sure to include your unit label measurements
How aes achieves confusion and diffusion : How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.
Prepare a multiple-step income statement for banting co : Prepare a multiple-step income statement for Banting Corporation for calendar year 20x2, showing separately gross profit, operating profit, profit before tax and net profit.
Please write a paper for me on data warehouse : Please write a  paper for me on Data warehouse vs Data mining (8pages APA format)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Hardware and software are in many items we use in our daily

hardware and software are in many items we use in our daily lives. name a few items in your house or office that have

  Information systems along with internet security necessary

Are Information systems along with Internet security necessary

  Decreasing risk of malicious attacks in personal systems

Security budgets is devoted to decreasing risk of malicious attacks. What threats are you aware of when it comes to the personal systems and systems at job

  What types of constraints can be created on the database

What types of constraints can be created on the database?

  Patient care applications

Patient care applications

  What are the primary components

What are the primary components that comprise an Oracle relational database management system? Identify at least 1 Bible verse that explains how we should facilitate relationships with each other. Expound upon this importance.

  Assignment increase text size

Assignment Increase text size

  What feature in windows vista provides a permission dialog

What feature in Windows Vista provides a permission dialog for Standard Users to enter administrator credentials to accomplish various tasks reserved for the latter group

  Determine how to set up the server for the future expansion.

Habibi's has a small network of 20 client workstations and a Windows Server 2008. Seven of those workstations are inside the restaurant and are used by the table servers to place customer orders.

  Which command displays network activity statistics for tcp

Which command displays network activity statistics for TCP, UDP, and IP? a. telnet b. nbtstat-s c. ping -s d. netstat -s e. nslookup

  Calculate roots of function by newton-raphson approximation

Best known iterative method for calculating roots of a function f (that is, x-values for which f(x) is 0) is Newton-Raphson approximation.

  Architecture to assist in the decision-making process

Using enterprise architecture to assist in the decision-making process, write a 1500 words paper in which you do the following:Determine activities that you believe would be appropriate for outsourcing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd