discuss recent legislation related to ethical computing, Business Law and Ethics

Throughout this course, you have analyzed and discussed case studies and issues on key ethical issues in information technology. Now it is time to consider how these theories apply to your current career and field of study.

Compile your research you have completed during this course. Reflect upon how what you have learned will change the way in which you conduct yourself in your career. What laws will affect you? What ethical theories will dictate the way in which you make decisions? Think about a situation in which you may be conducting business with people in other cultures. How might your beliefs differ from theirs? Use examples and/or case studies to demonstrate your position. Make sure that you explain each idea fully and support it with the appropriate research. As you write, you may consider some of the topics below:

• Ownership of information.
• Preventing spam, e-mail viruses, Denial-of-Service
• Computerized invasion of privacy.
• Developing policies for handling consumer information or Anonymity and identity.
• Plagiarism.
• Releasing buggy or imperfect software.
• Encryption Control Act
• Copyright Protection.

Refined Project Detail

1. Analyze legal and ethical issues in the field information technology.
• Clearly analyzes and evaluates an ethical theory and is well written and provides examples.
2. Apply ethical theories to information technology case studies.
• Formulates and makes recommendations to address ethical issues and summarizes opinion based on an ethical theory.

3. Discuss recent legislation related to ethical computing.
• Researches recent legislation regarding ethical computing and formulates an opinion based on an ethical theory.

4. Evaluate differences in ethical codes of information technology conduct in different cultures.
• Evaluates and makes recommendations to address differences in ethical codes of information technology conduct in different cultures in a very clear and detailed way.

Posted Date: 3/18/2013 1:59:30 AM | Location : United States







Related Discussions:- discuss recent legislation related to ethical computing, Assignment Help, Ask Question on discuss recent legislation related to ethical computing, Get Answer, Expert's Help, discuss recent legislation related to ethical computing Discussions

Write discussion on discuss recent legislation related to ethical computing
Your posts are moderated
Related Questions
Explain The criminal jurisdiction The criminal jurisdiction is exercised on the basis of the following: 1. Nationality 2. Territory 3. Universal jurisdiction and 4. Specifi

During the first lecture students asked for some assessments topics to guide them in the decisions that they need to take. Please note that: 1   Students may still formulate the

Qualifications of Advocates Conversely for qualify to admission as an advocate one must as; Be a US citizen or can say Possess a law degree from a recognized

"Detriment" as consideration  An example of a 'detriment' that will legally suffice like the consideration for a promise is provided with the case of Carlill v. Carbolic Smoke

State the theory of international antitrust A fourth approach is the allocation of jurisdiction over conduct with multijurisdictional effects to one agency by another agency th

I. Sammy has been under continuous employment with World Entertainment Ltd for 5 years. Last Friday Sammy was called to the Director's Office and verbally informed that h

Registration Procedures: The procedures to be followed by persons who intend to form a registered company will depend on whether the proposed company is to be a public company

Compensation for Loss of Office: (a) Section 192 makes it unlawful for a company to make a director any payment by way of compensation for loss of office, or  may as considera

QUESTION 1 (a) What are the three main features of security? Define the different types of security that banks normally take to secure credit facilities (b) The Borrower Pro

Q. Approaches to defining phoenix activity? There are a number of approaches to defining phoenix activity that could be used. These approaches are summarised below. It should b