Dilemma or ethically questionable situation relating

Assignment Help Basic Computer Science
Reference no: EM13936099

Task
Proceed according to the following instructions.

1. Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.
a. If using a workplace example, to maintain confidentiality, do not use real names.
b. If you use a media article you must include the link to the media article in the references list of your assignment.
2. Undertake further research about your chosen case to assist you in analysing and discussing it in your essay.

3. You are required to analyse the ethical dilemma you have identified above using use the Doing Ethics Technique (DET). The word limit is 700 words ± 10%. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicate in brackets the word count of your assignment excluding those items mentioned above.

4. Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at least TWO (2) quality academic references from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, the DET, Tavani, the Interact subject lecture notes etc BUT these references cannot be used as one of your two quality references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

 

Reference no: EM13936099

Questions Cloud

Carrying out a big data readiness assessment : The theme of the assignment is the reliability (or unreliability) of Assisted GPS Location Services in smart devices (Smart Phones, Tablets, Smart Cameras, etc.).
Prepare a social media marketing plan for new business : You have been provided with a brief from your client who is looking to establish a new business venture in south-east Queensland. You will be required to prepare a social media marketing plan for this new business.
What are some of the characteristics that you observe : Observe someone with a chronic illness in their natural environment. What are some of the characteristics that you observe? Are they comfortable or in pain
Why do interest rates vary among countries : Why do interest rates vary among countries? Why are interest rates normally similar for those European countries that use the euro as their currency?
Dilemma or ethically questionable situation relating : Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or onl..
What are the total contributions of the charter flight : What are the net income losses for this two-day period if the airline refuses the90-seat charter, stays in business, but temporarily shuts down? What are the netincome losses if it decides to operate and fly the charter that has been proposed?
Compare the cross exchange rate with the direct rate : Determine the cross exchange rate between the Japanese yen and the Australian dollar. Compare the cross exchange rate with the direct rate. Are there any differences? Evaluate the significance of your results.
Microsoft dynamics introduction : Topics: navigation, role center, productivity enhancement, decision support, workflow, industries supported, etc. Please write 1 FULL page report on what you have learned from this video (double space, font size 12) When watching videos, please ta..
Create a catch block that catches the exception : Write a C# console application in which you declare an array of five integers and store five values in the array.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Print the list after each value is inserted into the list

Generate 10 random numbers between in the range of 25 to 50. Insert them into a list, keeping the list in order as each value is inserted. Print the list after each value is inserted into the list.

  Update columns orderplaced subtotal shipping tax and totel

After a shopper completes an order, a procedure is called to update the following columns in the Basket table: orderplaced, subtotal, shipping, tax and total.

  Which information in computer critical to personal life

Let the information stored in the personal computer. Do you, at this moment, have information stored in your computer that is critical to your personal life?

  What is the subnet mask

Subnet the IP Address 172.16.3.5 to provide 25 networks with 2000  hosts. a.What is the Subnet Mask: ____________________ b.What is the CIDR value: ________

  Which must be populated in the code-behind file

which must be populated in the code-behind file. The values of the new controls must be output when a postback is done.

  What can be done to secure a wireless network

The commanding officer is having second thoughts on using the wireless network that was first considered. He is concerned about the security of a wireless network. Prepare a slide presentation on wireless networking and what can be done to secure a w..

  Half-wave and full-wave rectifier

Half-wave and Full-wave Rectifier The half-wave rectifier has a diode in series with a load resistor. True False

  File managers used in different distributions of linux

There are three main types of file managers used in different distributions of Linux. Orthodox file managers or "Commander-like" file managers have three windows (two panels and one command line window).

  How would the physical security aspect of protecting compute

How would the physical security aspect of protecting computer assets relate in this case? Make sure to give some examples.

  Calculate net pay and totals from the inputs provided

Write a program to calculate Net Pay and Totals from the inputs provided below. The program should use a loop & prompt user for inputs shown.

  Developing a system sequence diagram

SSDs are used to describe the behavior of a system at several levels of detail. Often, an SSD is used to model the detailed interaction of a collection of objects that collaborate to accomplish a particular goal. At a higher level of detail, a..

  Identify two emerging enterprise security trends and their b

Identify two emerging enterprise security trends and their benefits to a company's security strategy. Explain your reasoning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd