Identify an ict-related ethical issue from a media article

Assignment Help Other Engineering
Reference no: EM13934395 , Length:

I select google glass topic for my assignment from the below link

https://mobiledevnews.wordpress.com/2014/09/19/privacy-and-ethical-issues-with-google-glass/

You can use the following rationale online editor or any other software to construct a diagram with three different colour boxes and lines:

Software

https://www.rationaleonline.com/editor/

First you think about all possible logical arguments about your chosen case study. For example, the following are few possible logical arguments about the example provided in assignment 3 resources folder, entitled: "Foreign & local government surveillance creates privacy issues". Why it is ethically wrong to collect Meta data.

Now you need to work on to differentiate all arguments in support (because)-green colour, oppose (but)-red colour and objection to an objection (however)-orange colour

Green box: because-Information is stored for long periods of time and is accessible by many people

Red box: but-Google collections' data from unsecured wi-fi networks was not intentional

Orange box: however-Google differentiated between encrypted and unencrypted content

You are required to complete the following:

Step 1. Construct a diagram to map the arguments about a moral claim that you have identified in the article/case study:

• Include all supporting and objecting claims. These claims should include facts collated from your own research and classical ethical theories that support or object to the claim
• You are expected to 'finish off' the case's arguments, turning it into a valid and properly structured argument.
• You should use information from the article/case study, other sources discovered during your research, and your own reasoned arguments. A balanced and impartial argument is the objective.
• The main claim/conclusion must be an ethical claim.

Step 2.Write an essay, which maps closely to the diagram that you constructed in Step 1.
• The word limit for the essay is 1300-1400. Headings, citations and references do not count towards the word limit, but quotations do.
• All the claims shown on the diagram must appear in the essay, and all claims made in the essay must appear on the diagram. The essay must present all the detailed information that the diagram cannot.
• Remember to analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

Step 3. Write an overall conclusion that justifies your recommendations made in your essay.

Step 4. Reference list
• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
• You must include at least FIVE (5) quality academic references from different sources. Please note that these five references are in addition to those provided to you through this subject (for example, you still must reference, Tavani, the Interact subject lecture notes etcBUT these references cannot be used as one of your five quality academic references from different sources).
• Only use references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

NOTE: Format your assignment according to the instructions given in the Assessment Information, Presentation section.
Rationale

In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to convert an argument into proper form and evaluate the elements of the argument by introducing classical ethical principles where appropriate.

Since Assessment item 1 and 2, your knowledge will have grown, and you will now realize that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.

In ICT, the main ethical issues are taken to be:
• ICT professionalism
• Privacy
• Security
• Cyber-crime
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing.

The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
• identify an ICT-related ethical issue from a media article or case study;
• using a critical analysis technique, analyse the detailed logical structure of the arguments given in the media article/case study and convert the overall argument into a valid and well-structured argument that supports or refutes an ethical position;
• apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
• derive logical and justifiable conclusions to resolve the ethical issue(s);
• develop structured, coherent and logical arguments to support or refute claims; and
• apply proper academic referencing.

Verified Expert

Reference no: EM13934395

Questions Cloud

Find holding-period return for one-year investment period : A newly issued bond pays its coupons once a year. Its coupon rate is 5.3%, its maturity is 20 years, and its yield to maturity is 8.3%. Find the holding-period return for a one-year investment period if the bond is selling at a yield to maturity of 7..
Assume that the risk premium : Grammy phone is a cellular firm that reported a net income of $50 million in the most recent financial year. The firm had $1 billion in debt, on which it reported interest expenses of $100 million in the most recent financial year. Also assume that t..
According to the expectations hypothesis : Consider the following $1,000 par value zero-coupon bonds: Bond Years until Maturity Yield to Maturity A 1 4.9% B 2 5.9 C 3 6.4 D 4 6.9 According to the expectations hypothesis, what is the market’s expectation of the one-year interest rate three yea..
The yield to maturity on one-year zero-coupon bonds : The yield to maturity on one-year zero-coupon bonds is 7.8%. The yield to maturity on two-year zero-coupon bonds is 8.8%. What is the forward rate of interest for the second year?  If you believe in the liquidity preference theory, is your best guess..
Identify an ict-related ethical issue from a media article : Construct a diagram to map the arguments about a moral claim that you have identified in the article/case study - identify an ICT-related ethical issue from a media article or case study.
How long do you have to pay before the account is overdue : You place an order for 320 units of inventory at a unit price of $180. The supplier offers terms of 3/15, net 30. How long do you have to pay before the account is overdue? a-2 If you take the full period, how much should you remit? What is the disco..
Rate of return on bond during the one-year holding period : Assume you have a one-year investment horizon and are trying to choose among three bonds. All have the same degree of default risk and mature in 10 years. The first is a zero-coupon bond that pays $1,000 at maturity. If you expect their yields to mat..
How would this effect his tax return-add any filled out form : Jack also runs his own tax preparation business on the side at 12 Main St., Virginia City NV 89406, as a single member LLC. His cash receipts from the business totaled $43,000 for 2014. He also is owed $1,700 from a client that refused to pay for his..
What is the practical use of country risk rating analysis : Define political risk. Give an example of political risk for multinational corporations. 1. How is political risk different from the country-risk notion? What is the practical use of country risk rating analysis for multinational-corporation managers..

Reviews

Write a Review

Other Engineering Questions & Answers

  Which digitization has changed the manner

Describe at least three ways in which digitization has changed the manner in which society consumes information.

  Evaluate the stability using rouths hurwartz criterion

Evaluate the stability using Rouths Hurwartz criterion and obtain the range of K value for the stability under various controllers and evaluate the relative stability of the system with P and I controllers.

  Question 1a develop a safety program to help reduce the

question 1a develop a safety program to help reduce the risks of electrical hazards in a workshopb in terms of

  Determine how many units of each product to produce

Determine how many units of each product to produce so as to maximize profit. For each unit of product 1, 1 unit of frame parts and 2 units of electrical components are required.

  Case studya hospital would like to acquire a new medical

case studya hospital would like to acquire a new medical device surgical microscope to improve the success rate of eye

  Discuss ramifications of opposing objectives on the project

Critically outline the pros and cons of both strategies described above. Which strategy do you favour?Justify your answer with relevant theory.

  Find the maximum mass flow rate

a. Find the maximum mass flow rate, and exit pressure under design conditions. b. What is the exit pressure for a normal shock wave to appear at the inlet of the duct. c. What is the exit pressure for a normal shock wave to appear at the middle of th..

  State any seven refrigeration systems

State any seven refrigeration systems, mention the methods employed to attain low temperatures, and state any merits and limitation of that system.

  Describe a tunnel-boring machine in detail

Describe a tunnel-boring machine in detail and cite examples of their use. Particular emphasis should be placed on the cycle of operations for such a machine.

  Explain the operation of an encoder

Explain the operation of an encoder.

  Multipah channel models

A transmitter transmits a signal s(t) with carrier frequency fc. The signal reaches the receiving antennas through three paths. The path gains are a1, a2, and a3.

  Draw the block diagram of the encoder

A convolutional encoder has a single-shift register with two stages, (i.e., constraint length K = 3), three modulo-2 adders, and an output multiplexer. The generator sequences of the encoder are as follows:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd