Case study - diane the consultant

Assignment Help Computer Networking
Reference no: EM13115284

Case study:Diane the consultant

Summary of case :

Three years ago Diane started her own consulting business. She has been so successful that she now has several people working for her and many clients. Their consulting work included advising on how to set up corporate intranets, designing database management systems, and advising about security.

Presently she is designing a database management system for the personnel office of a medium-sized company. Diane has involved the client in the design process, informing the CEO, the director of computing, and the director of personnel about the progress of the system. It is now time to make decisions about the kind and degree of security to build into the system.

Diane has described several options to the client. Because the system is going to cost more than they planned, the client has decided to opt for a less secure system. She believes the information they will be storing is extremely sensitive. It will include performance evaluations, medical records for filing insurance claims, salaries, and so forth.

With weak security, employees working on client machines may be able to figure out ways to get access to this data, not to mention the possibility of on-line access from hackers. Diane feels strongly that the system should be much more secure. She has tried to explain the risks, but the CEO, director of computing and director of personnel all agree that less security will do.

Task

Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your first assignment has been submitted.

1. Choose one of the media articles or case studies listed by the lecturer in Interact.

2. Use the title of the article/case study provided in interact as the title of your essay, so that the lecturer knows which article you are analysing.

3. Undertake further research about your chosen topic, to assist you in analysing and discussing it in your essay.

You are required to complete the following:

Step 1. Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

• Include all supporting and objecting claims. These claims should include facts collated from your own research, classical ethical theories that support or object to the claim and ACS codes that are in conflict with the claim
• You are expected to 'finish off' the case's arguments, turning it into a valid and properly structured argument.
• You should use information from the article/case study, other sources discovered during your research, and your own reasoned arguments. A balanced and impartial argument is the objective.
• All arguments must obey the Golden Rule, Rabbits Rule, Holding Hands Rule and the Pyramid Rule.
• The main claim/conclusion must be an ethical claim.

Step 2. Write an essay, which maps closely to the Rationale diagram that you constructed in Step 1.
• The word limit for the essay is 1,300 words ± 10%. Headings, citations and references do not count towards the word limit, but quotations do.
• All the claims shown on the Rationale diagram must appear in the essay, and all claims made in the essay must appear on the Rationale diagram. The essay must present all the detailed information that the Rationale diagram cannot.
• Remember to analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

Step 3. Write an overall conclusion that justifies your recommendations made in your essay.

Step 4. Reference list

• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
• You must include at least five (5) quality references from different sources. Please note that these five references are in addition to those provided to you through this subject (for example, you still must reference, Tavani, the ACS code, the Interact subject lecture notes etc BUT these references cannot be used as one of your five quality references from different sources).
• Only use references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

Reference no: EM13115284

Questions Cloud

Explain what is the theoretical number of workstation : What is the theoretical number of workstation? Which workstation are assigned to each workstation?
Calculate the molarity of each of the following solutions : Calculate the molarity of each of the following solutions: (a) 29.0 g of ethanol (C2H5OH) in 545 mL of solution, (b) 15.4 g of sucrose (C12H22O11) in 74.0 mL of solution.
What is the final pressure of the gas : A sample of gas with an initial volume of 27.6L at a pressure of 735 mmHg and a temperature of 309 K is compressed to a volume of 15.8 L and warmed to a temperature of 374 K.
Calculate the mass of benzene : The density of benzene at 15C is 0.8787 g/mL. Calculate the mass of 0.1500 L of benzene at this temperature.
Case study - diane the consultant : Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:
Explain the legal principle apparent authority : They must also not enter into any other agreements that conflict with the duties that are owed to their principals. Before entering into any such agreements, they must disclose that information to their principals.
Illustratr what is the amplitude of the oscillations : Illustratr what is the amplitude of the oscillations? What were the (b) position and (c) velocity of the block at t = 0 s?
Business asset depreciation : What is the book value at the end of years one and two using the 150%declining balance method?
What is the percentage change in the price of these bonds : what is the percentage change in the price of these bonds? If the interest rates were to suddenly fall by 2%

Reviews

Write a Review

Computer Networking Questions & Answers

  Managing intrusion detection environment

As security manager at XYZ Corporation, you are responsible for managing intrusion detection environment. If you were given the ability to build the environment from scratch, would you use network based IDS, host based IDS, or a combination?

  Compute total end-to-end delay to send packet of length l

Assuming that switches user store-and-forward packet switching, what is the total end-to-end delay to send a packet of length L? (Ignore queuing, propagation delay, and processing delay.)

  Security issues

Provide an example explaining the best use of Virus, Encryption, VPN, Firewall securities, when and why?Which security areas you are using and applying to your securities? Also explain why?

  Design application-layer protocol for streaming video

Suppose you are designing the application-layer protocol for streaming video. How would you deal with unreliability of Internet Protocol?

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Which protocol is used to avoid defeat

You and Luke Sky Walker are commanders in rebel army preparing to attack Darth Vader and his Death Star. Is there protocol which you and Luke can use to avoid defeat? If not, describe why not.

  Question about tcp networking

A TCP entity in Host 1 receives a section from a corresponding TCP entity in Host 3. The received section has the following header field values se

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Determine the bandwidth-delay product r tprop

Assume two hosts, A and B, are separated by 20,000 kilometers and are connected by direct link of R = 1 Mbps. Determine the bandwidth-delay product, R * Tprop?

  Explain ping sweeps and port scans

Your boss has just heard about some nefarious computer activities known as ping sweeps and port scans. He wishesto know more about them and what the impact of these activities might be on company.

  Relationship-individual characteristics and job satisfaction

What is the relationship between individual characteristics and job satisfaction?

  Data communications and net-centric computing

List A below contains the layers of the internet protocol. List B contains items and applications associated with these layers. Recreate the answer table show below in your answer booklet and put the protocol layers in their correct order.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd