Analyze current ethical considerations and issues

Assignment Help Management Information Sys
Reference no: EM131238489

Assignment : LASA : Applying Ethics

For this assignment, you will define ethics within the context of digital forensics. You will then apply what you learned to your life, developing an ethical code-of-conduct document.

Scenario:

Your manager has asked you to create a code-of-conduct document for your organization to give to employees during their new-hire orientation. In the code-of-conduct document, you are asked to focus on the sharing of personal or professional data and the ethics involved in sharing data.

Tasks:

Create a code-of-conduct document with the following:

Define ethics. Explain what it is and how it applies to digital forensics, while also describing ethical and unethical handling of forensic information.

Evaluate current or past news events related to each of the four branches of digital forensics: Computer forensics, mobile device forensics, network forensics, and database forensics.

Consider topics such as identity theft, the Patriot Act, or Wikileaks. Share your thoughts on the major themes and ethical concerns and give some insight into how it impacts you personally and professionally.

Analyze current ethical considerations and issues.

Review the following articles:

When IT Is Asked to Spy- "https://search.proquest.com.libproxy.edmc.edu/docview/759655421"

Lost Data Tied to CPP Claims: Ottawa Says USB Stick Has Info on Applicants for Disability Benefits- "https://search.proquest.com.libproxy.edmc.edu/docview/1265805910"

Select two additional articles from this list that illustrate ethical considerations and issues. Ideally, you should not have previously used these two articles for another assignment in this class.

Create a code-of-conduct document you can use in professional situations as it relates to accessing or sharing data. This can be a checklist or bulleted list of "Do and Do Not Tasks." Consider the examples and resources below when creating your code-of-conduct document:

The International Society of Forensic Computer Examiners. (n.d.).

Code of ethics and professional responsibility. Retrieved from

https://www.isfce.com/ethics2.htm
Barbara, J. (2008). Ethical practices in digital forensics: Part 2.

Retrieved from https://www.forensicmag.com/article/

ethical-practices-digital-forensics-part-2
The American Society of Digital Forensics and eDiscovery. (n.d.).

Domain 3 - Ethics and code of conduct. Retrieved from

https://sites.google.com/site/asdfedorg/domain-3

Note: Your final product should be a Microsoft Word document, approximately seven to nine pages in length, incorporating five to seven scholarly sources. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in the accurate representation and attribution of sources (APA); and display accurate spelling, grammar, and punctuation.

Reference no: EM131238489

Questions Cloud

Find the mach number and the stagnation temperature : The speed of sound in liquid water at 25?C is about 1500 m/s. Find the stagnation pressure and temperature for a M = 0.1 flow at 25?C, 100 kPa. Is it possible to get a significant Mach number flow of liquid water?
State the direction of the alternative hypothesis : State the direction of the alternative hypothesis used to test the taskforce claim. Type gt (greater than), ge (greater than or equal to), lt (less than), le (less than or equal to) or ne (not equal to) as appropriate in the box.
Experimental data in which the response variable : A simple linear model was fitted to experimental data in which the response variable is a drug release rate (% released / sqrt of time) and the independent variable is the surface area to volume (mm^2 / mm^3).
How far away is the lightning : If the sound of thunder is heard 5 s after the lightning is seen and the temperature is 20?C, how far away is the lightning?
Analyze current ethical considerations and issues : Evaluate current or past news events related to each of the four branches of digital forensics: Computer forensics, mobile device forensics, network forensics, and database forensics.
Estimate the time it will take to empty the tank of water : Find the speed of sound for air at 100 kPa at the two temperatures 0?C and 30?C. Repeat the answer for carbon dioxide and argon gases.
Calculate the velocity of the water leaving the nozzle : The nozzle is located 15 m above the pump, and the atmospheric pressure is 100 kPa. Assuming reversible flow through the system, determine the velocity of the water leaving the nozzle.
Write an essay on antigone and tamar : Write the given paper assignment. - Write an essay on Antigone and Tamar. - Describe whether these characters are believable or not and make some comparisons between the two of them.
Research the future of network forensics : Provide a statement of clarification or a point of view with the rationale. Draw comparisons between the examples you provided and the examples submitted by your peers.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Does this process support operational effectiveness

Choose a health care organization or provider with which you are familiar, and describe its patient information capture process. Does this process support operational effectiveness, satisfy compliance requirements, and promote quality patient care..

  Discuss two major issues involved with acquiring systems

Discuss two major issues involved with acquiring systems and two major issues commonly faced when maintaining them. Address how each can be minimized or overcome

  Global operations management sample questiona why is

global operations management sample questiona. why is effective operations management vital for a global

  Project management and operations management

Project management and operations management - Compare and contrast project management and operations management.

  Cost of hardware and software

Case Study: You are the Chief Information Officer (CIO) of a medium sized business that provides an online data base to Internet subscribers. Cost of hardware and software

  Discussion - creating objects

Write a 200- to 300-word short-answer response to the following: Using the example of your choice (i.e, a car, a bicycle, a puppy), explain how you would structure an object based on its attributes and behaviors

  Describe online analytical processing

Describe at least two methods that business owners could use in order to protect the privacy of both personal information and organizational data resources related to the Web and information technologies. Provide one example of the use of each met..

  What are the various threats to information security

What are the various threats to information security

  Explain hierarchy processes and project control systems

Project Management: Alternatives, Hierarchy Processes and Project Control Systems and Technologies - example of each type of technology and explain why you feel it fits into the category.

  What uses will the technology have in the future

Future of Technology Item - What uses will the technology have in the future? Will the technology item continue to evolve as technology in general improves

  Determine the network that you would implement

Imagine that you are moving into a new house and need to consider the home network that you will use. Outline the main considerations that you need to take into account when evaluating your networking options. Examine the major types of networks a..

  How are mobile computing web 2.0 and social media changing

How are mobile computing, Web 2.0, and social media changing how IT systems are used

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd