Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13903043

Paper B1-Privacy-Related Matrix (12%)

This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Report - at: https://epic.org/reports/ See List on left: HOT POLICY ISSUES

and/or: https://www.eff.org/issues/privacy [see list at right on this page]

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical issue and how this issue is affected by laws, regulations, and policies.

Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

  1. Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix:

Why I chose the dilemma;

Why I chose the three principles; and

An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Submit the matrix for grading in your Assignments Folder.  
  2. Indicate appropriate APA reference citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2 below. The issue identified in this assignment will be used in B 2 Assignment.  Make sure you read the B2 assignment below so that you understand the relationship prior to starting B1.

Normative Ethics List

Autonomy: the duty to maximize the individual's right to make his or her own decisions.

Beneficence: the duty to do good both individually and for all.

Confidentiality: the duty to respect privacy of information and action.

Equality: the duty to view all people as moral equals.

Finality: the duty to take action that may override the demands of law, religion, and social customs.

Justice: the duty to treat all fairly, distributing the risks and benefits equally.

Non-maleficence: the duty to cause no harm, both individually and for all.

Understanding/Tolerance: the duty to understand and to accept other view points if reason dictates doing so is warranted.

Publicity: the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: the duty to tell the truth.

Ethical Dilemma Matrix:

Ethical dilemma:

Stakeholders

1

2

3

4

Step 1:  Identify the ethical dilemma based on one of the broad categories identified. An example (following here) might be to falsify your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc.  Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3:  Choose any three of the principles that might apply such as autonomy, publicity, and veracity.

Step 4: identify how the dilemma affect each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

See example, next page-
For example:

Ethical dilemma: falsifying  your profile on a social networking site

Stakeholders

Autonomy

Publicity

Veracity

1: You

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2:Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

4

 

Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf

 

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%)

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. 

The following elements must be addressed:

  1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies/computer.php
  1. Your policy should include the following major headings:

Overview of policy

Purpose

Scope (roles and responsibilities of stakeholders)

 Policy/Procedures to follow

Sanctions/Enforcement

  1. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.
  2. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use.
  3. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  4. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM13903043

Questions Cloud

Determine the optimal order quantity per order : A firm is faced with the attractive situation in which it can obtain immediate delivery of an item it stocks for retail sale. The firm has therefore not bothered to order the item in any systematic way. Demand for the item is reasonably constant over..
Design process : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..
Record the sale by balus company : Record the sale by Balus Company of $ 125,000 in accounts receivable
Explain the general aviation revitalization act : You are the Vice President of Risk Management for the newly formed Lake Cherokee Aircraft Company. The company president asks you to explain the General Aviation Revitalization Act (GARA) to her.
Privacy-related matrix : This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating t..
Describe the ownership of the country''s media : Detail the ownership of the country's media
Property management agreement with andrew hoganmuller : Suppose CCP Management, Inc., entered into a property management agreement with Andrew Hoganmuller and several companies which Hoganmuller operated. Was this a legal contract? If it is an illegal contract, is it void or voidable in whole or in part? ..
What was total conversion cost incurred during the period : The ending inventory represented 2,000 equivalent units of work this period. What was the total conversion cost incurred during this period?
Cipher operation paper : How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What does n-tier architecture mean

What does N-tier architecture mean? Describe the purpose of the Presentation Layer, Business Layer, and Data Layer

  Write a java program recursively and iteratively

write a java program recursively and iteratively that reads an integer of up to five digits. Write it out individually in both forward and backward order.

  Write a program that prompts a salesman

Write a program that prompts a salesman to enter his/her status and total sales. Compute/display the following: their status; total sales; commission rate applied; the commission ($) earned (the appropriate rate times the sales).

  Computers and word processing applications

Provide at least three (3) concerns that you believe the group would have about using computers and word processing applications

  Page file is stored in a solid state drive

Assuming that the page file is stored in a Solid State Drive (SSD) and the Translation Look-aside Buffer (TLB) is stored in cache, what is the Effective Access Time (EAT) of a memory access in a memory subsystem

  Business process reingineering

Topic: Business Process Reingineering 1. Search the Web and locate three (3) Web sites that relate to the topic. These sites could be white papers or research documents found on research databases, commercial or non-commercial sites that have somethi..

  Identification of the concept of a target audience

You are working on a new Web site for Cruzes, Inc. The Web site is aimed at providing travel information to consumers interested in cruises. When meeting with Jason, the marketing manager of Cruzes, Inc

  Computer network power point slide

LLMD Co. has 5 locations across the country, with each location housing a division of the company. Each division houses several hundred users, totaling approximately 1,000 users.

  Find the deepest value in a binary tree in c++

How do you find the deepest value in a binary tree in C++?

  Java how to program 10th edition

Java How To Program 10th Edition

  Benefits of creating web presence for a small business

What are some of the benefits of creating web presence for a small business, including marketing and increased customer base?

  Demonstrate ability to integrate and apply information

demonstrate ability to integrate and apply information from various topics and to apply understanding and knowledge to a practical situation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd