Required to analyse the ethical dilemma

Assignment Help Basic Computer Science
Reference no: EM13936238

Proceed according to the following instructions.

1. Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.
a. If using a workplace example, to maintain confidentiality, do not use real names.
b. If you use a media article you must include the link to the media article in the references list of your assignment.

2. Undertake further research about your chosen case to assist you in analysing and discussing it in your essay

3. You are required to analyse the ethical dilemma you have identified above using use the Doing Ethics Technique (DET). The word limit is 700 words ± 10%. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.

4. Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least TWO (2) quality academic references from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, the DET, Tavani, the Interact subject lecture notes etc BUT these references cannot be used as one of your two quality references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.
NOTE: Format your assignment according to the instructions given in the Assessment Information, Presentation section.

Reference no: EM13936238

Questions Cloud

Write a program that opens a file and reads in two vectors : Write a program that opens a file, reads in two vectors, and then computes their dot product
Compare output levels in settings characterized by cournnot : Two firms compete in a market to sell a homogeneous product with inverse demand function P = 400 - 2Q. Each firm produces at a constant marginal cost of $50 and has no fixed costs. Use this information to compare the output levels and profits in sett..
How this disease is affecting different racial groups : Compare and contrast how this disease is affecting different racial and ethnic groups. On the basis of your calculations, what information can you conclude
Javascript techniques to improve usability : Design a suitable applied web form example which has a work context. The form that needs to be created is a contact form for a Student Forum. Design the form which must have user input and a range of form furniture Ie. Buttons/ user Input fields. ..
Required to analyse the ethical dilemma : Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or onl..
Features and benefits for consumer when making a decision : Explain which features and benefits are most important to the consumer when making a decision about this type of product.
What is a common or key theory related to your inquiry topic : What is a common or key theory related to your inquiry topic for this course, or used in the research article that you read
Find an area in database programming : The project assignment in this class is to find an area in database programming and/or design that interests you, and expand upon it. This may be the development of a working system of your own to provide information, or a study of an existing dat..
What is the purpose of theory : What is the purpose of theory and how does this differ from a conjecture or opinion? Compare scientific inquiry with naive inquiry (conjecture or opinion) commenting particularly on the differences in the quality of data collection and analysis, t..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A calculator application that allows prefix, infix and postf

A calculator application that allows prefix, infix, and postfix expressions to be evaluated (i.e., allows all 3 types of expressions

  Design a payroll class

Write the appropriate accessor and mutator methods and a constructor that accepts the employee's name and ID number as arguments.

  Electronic evidence admissible

Identify and discuss the steps necessary to make electronic evidence admissible in court.

  Create a four-function fraction calculator

Create a four-function fraction calculator. Here are the formulas for the four arithmetic operations applied to fractions.

  Assignment concerns consumer profiling

The third participation assignment concerns consumer profiling! The attached article "What do firms know about you? FTC would pull back the curtain," by Craig Timberg from the Washington Post of 5-28-14 has some details. There are three questions ..

  Distinguish between simple object access

Distinguish between Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery, and Integration (UDDI).

  The method will return this count back to a variable in main

The method will return this count back to a variable in main

  Create the work breakdown structure

Create the work breakdown structure (WBS) as shown in the textbook listing the tasks that will need to be completed to meet the project's objectives.

  Virtual written report and powerpoint presentation

This assignment contains two (2) sections: Written Report and PowerPoint Presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is wri..

  Write a function print_array()

The program should have a function count() for counting the number of negative elements and the number of non-negative elements of an array, a function split() for splitting the list into negative and non-negative lists, and a function print_array..

  First describe the mission of each organization

First describe the mission of each organization, as found on their web site.  Discuss how each organization has been targeted in the recent past for cyberattack(s), as reported in news or journal articles.  Describe the suspected threat actors.  Disc..

  Based on your executive summary produced in lab

Based on your executive summary produced in LAB#4 - Perform a Qualitative Risk Assessment for an IT Infrastructure, what was the primary focus of your message to executive management?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd