Identify the ethical issue that you want to analyze

Assignment Help Computer Networking
Reference no: EM131275866 , Length:

Assignment Paper

Instructions

Paper B1: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy.

This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, related to privacysubject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Privacy Issues at: https://epic.org/privacy/ See List on left and/or: EFF Privacy at https://www.eff.org/issues/privacy [see list in center on this page].

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

1. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics principles below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

2. Prepare the Ethical Issue matrix and include the following explanation (200 words) -double-space your narrative-below the matrix:
1. Why I chose the dilemma;
2. Why I chose the three principles; and

3. An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

1. Submit the matrix for grading to the LEO Assignments Module.
2. Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2. The ethical issue identified in this assignment will be used in your Paper B2 Assignment. Paper B2 asks you to write a policy that corrects the ethical issue described in Paper B1.

Normative Ethics List

Autonomy: is the duty to maximize the individual's right to make his or her own decisions.
Beneficence: is the duty to do good both individually and for all.
Confidentiality: is the duty to respect privacy of information and action.
Equality: is the duty to view all people as moral equals.
Finality: is the duty to take action that may override the demands of law, religion, and social customs.
Justice: is the duty to treat all fairly, distributing the risks and benefits equally.
Non-maleficence: is the duty to cause no harm, both individually and for all.

Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted.
Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: is the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: is the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: is the duty to tell the truth.

A sample template for the matrix is shown below. To reconstruct the sample template, you may use the Table Tool in MS Word or copy and paste this template.

Ethical issue:

Stakeholders

(Principle 1)

(Principle 2)

(Principle 3)

1




2




3




4




Step 1: Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc. Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3: Choose any three (only three) of the principles that might apply to your issue such as autonomy, publicity, and veracity.

Step 4: identify how the ethical issue affects each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

Sample Completed Matrix

Ethical issue: falsifying your profile on a social networking site

Stakeholders autonomy publicity veracity

1: Yourself You have the duty to maximize the right to make your own decisions. You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved. You have the duty to tell the truth

2: Other users of the networking site They have the duty to make their own decisions They make these decisions based on ethical standards that should be recognized by the person falsifying their profile They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site The autonomy of the site is limited by law (Goldman, 2007) Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all. As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

Reference:

Goldman, E. (2007, May). Social Networking Sites and the Law.

Retrieved from

https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw

Verified Expert

The methods about how to state the ethical issue in the form of matrix and how the stake holders and principles are combined together to get a complete picture of the concerned actions were discussed here. In producing these matrix the choosing of principles is very important since these are directly connected to the issue and being most affected. The motive was to state clear actions as to ethical issue but if we choose wrong principles or wrong stake holders we will not be able to state correct actions. Hence the choice of principles and stake holders is very important.

Reference no: EM131275866

Questions Cloud

Is us making progress in reducing or preventing terrorism : Is the United States making progress in reducing or preventing terrorism? If the United States is NOT making progress, what would have to happen to make the efforts against terrorism more effective?
Is japanese work ethic comparable to american work ethic : Is the Japanese work ethic comparable to the American work ethic? Japanese corporations typically involve many more organizational levels and people in the development of implementation plans than do U.S. corporations. Is this appropriate? Why or why..
How much fuel is required? ignore friction for now : An Airbus 310A with a mass of 140,000 kg sits on a runway. It takes off and flies to an altitude of 10500 m with a speed of 850 km/hr. If aviation fuel provides 43 MJ of energy per kg, how much fuel is required? Ignore friction for now.
How best to improve or address issues inherent in the topic : Provide thoughts on how best to improve/address the problems/issues inherent in the topic, including providing an example of ‘best practices' (if they exist) (approximately 2 pages).
Identify the ethical issue that you want to analyze : Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.
Assume a more managerial role : A supervisor is trying to make his new assistant manager Roger more assertive in dealing with his co-workers. For the first couple of weeks, every time Roger issued an order or made a decision based on what is good for the company rather than in acco..
What opening comments should be verbalized : What opening comments should be verbalized when approaching fishermen who are launching their boats? Draft a script to be used when asking these fishermen to take part in the survey.
Determine wcv expressed in kw : Determine Wcv expressed in kW. (Air at 15psi and 80F enters a compressor with a speed of 200 ft/s. The air exits the compressor at 300psi and 1,000F with a speed of 15 ft/s.)
How does the benefit of a cafr seem worth the expense : How does the benefit of a comprehensive annual financial report (CAFR) seem worth the expense from your perspective? How could management information systems provide too much information for a decision maker?

Reviews

Write a Review

Computer Networking Questions & Answers

  Find data transmission rate in bits per second of system

Assume that the airliner carries 10,000 kg of those floppies at the speed of 1000 km/h over the distance of 5000 km. Determine the data transmission rate in bits per second of this system?

  Draw overall network diagram based on the above description

Draw overall network diagram based on the above description. Your diagram must include layouts that include all the necessary interconnection devices that connect servers, laptops, and PCs.

  Data validation refers to checking the content

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..

  How the polling mechanism will work to distribute

Explain what does it mean by "maximum weighting matching on U"? Show with an example. Construct a hypothetical matrix U and perform the Hungarian algorithm steps to show the process. You can take 4 by 4 matrix for example with entries f your own c..

  Describe effects of spyware and adware-security of internet

Describe the effects of spyware and adware. How has spyware and adware influenced public's confidence in security of the Internet?

  Explain and plan server deployments and images

Explain and plan server deployments and images. Compare and contrast deployment strategies among different application servers and server roles.

  What is the ip address and tcp port number

What is the IP address and TCP port number used by the client computer that is transferring the file - What is the IP address and TCP port number used by your client computer to transfer the file to gaia.cs.umass.edu?

  Question 1 a member of a project team that is implementing

question 1 a member of a project team that is implementing a new credit card payment process at a bank has direct

  Why you think dynamically assigning ip addresses are useful

Is the IP address 192.168.12.254 a valid address for use by a computer connected directly to the Internet? Explain your answer. c) Is it possible to divide a class C network into 14 subnets with 15 computers connected to each sub network? Explain..

  Draw diagram showing network design indicating the switches

Draw a diagram showing the network design indicating the switches, firewalls, routers, WAN and Internet connections, servers, etc. Please use APA formatting. The paper should be written professionally.

  What are some causes of the number of bytes

What are some causes of the number of bytes on the wire exceeding the number of bytes being captured. What are the source and destination MAC address in Frame 546

  Identify the critical path and other paths through network

Construct the project activity network using AON methodology and label each node. Identify the critical path and other paths through the network

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd