Pick an ethical issue rooted in cybertechnology

Assignment Help Computer Network Security
Reference no: EM132161883

Ethics & the Information Age Project

1. Pick an ethical issue rooted in cybertechnology that interests you.

2. Create an annotated outline which lays-out your topic, thesis, and analytical process, including premises. This must be clear and complete. This outline should be well organized; include APA citations(reputable sources); and persuasive.

3. Create a video (3 - 5 minutes in length). You've seen some interesting videos this semester, use those ideas to let your creativity fly! Your video should:
o Clearly define your ethical dilemma
o Clearly use deontology, utilitarianism or just consequentialism to analyze a positive ethical outcome. (This should guide your project).
o Your analysis should be summarized but efective. (Target audience = society, likely not very well-versed in ethical analysis).

Deliverable:
- An outline
- A video
- Fully prepared copyright application (you may in the alternative, explore licensing through Creative Commons or Copyleft).
- Your presentation to the class (6 - 10 minutes) will explain why you chose the topic, why you chose your theory(ies), and what you learned from this assignment. Think of this like your "elevator speech." You will present this to your peers in class.(Target audience = classmates/fellow ethicists). You will then show your video.

Further Instructions:
1. Apply for copyright to protect the intellectual property of your video. Learn what you would need to do in order to copyright your work. you are not expected to actually submit your application. You may also investigate Copy Left and Creative Commons.

2. Remember: any resources must be properly cited in your annotated outline and/or your reference in your YouTube and PPT.

Video Making Resources
As you prepare for theProject, you may benefit from a list of video making resources. Depending on the software you have, or may want to purchase, or get for free there are a few options. You are not required to obtain or purchase anything! A non-exclusive list below and feel free to add a resources not included below:

3. PoWToons
4. Animoto
5. Flipagram
6. Musicly
7. Triller
8. Adobe Spark

Attachment:- Project.rar

Verified Expert

Ethical principles that govern a person’s behavior are a critical part of any sound Cybersecurity defense strategy. Without clear ethical standards and rules, Cybersecurity professionals are almost indistinguishable from the black-hat criminals against whom they seek to protect systems and data. The study of Cybersecurity ethics, which encompasses a wide array of approaches and schools of thought, does not offer a simple solution to the many complex ethical dilemmas IT professionals, chief information security officers (CISOs) and organizations face on a daily basis. This paper describes ethical challenges in Cybersecurity and is written in Microsoft Word Document File.

Reference no: EM132161883

Questions Cloud

Program that functions as a simple boolean calculator : Create a program that functions as a simple Boolean calculator for 32 bit integers. It should display a menu that asks the user to make a selection
What did the monroe doctrine declare : What did the Monroe Doctrine declare? The Congress of Vienna led to what agreement?
How do you express the values in your professional life : Identify three to five personal values or characteristics that you believe are critical components of a good leader, such as honesty, compassion, or fairness.
Consensus algorithm for a blockchain of choice : Please discuss which one will you select as the most suitable consensus algorithm for a blockchain of your choice? And why?
Pick an ethical issue rooted in cybertechnology : Create an annotated outline which lays-out your topic, thesis, and analytical process, including premises. This must be clear and complete
Measures based on performance in current job : What is the advantage of using measures based on potential for future jobs? What is the advantage of using measures based on performance in the current job?
Optimistic or pessimistic stance : Comment on whether we should consider this an "optimistic" or "pessimistic" stance.
Describe an interaction or decision point : Describe an interaction or decision point this semester in which your nurse leader demonstrated humility or a missed opportunity to promote the success.
Determine the amount to be capitalized in an asset account : Southwest Milling Co. purchased a front-end loader to move stacks of lumber. Determine the amount to be capitalized in an asset account for purchase of loader

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd