Privacy-related matrix

Assignment Help Basic Computer Science
Reference no: EM13903823

Paper B1-Privacy-Related Matrix (12%)

This assignment gives you an opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Report - at: https://epic.org/reports/ See List on left: HOT POLICY ISSUES

and/or: https://www.eff.org/issues/privacy [see list at right on this page]

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

 

Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical issue and how this issue is affected by laws, regulations, and policies.

Use the list of normative ethics below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.

  1. Prepare the Ethical Dilemma matrix and include the following explanation-double-space your narrative-below the matrix:

Why I chose the dilemma;

Why I chose the three principles; and

An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Submit the matrix for grading in your Assignments Folder.  
  2. Indicate appropriate APA reference citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2 below. The issue identified in this assignment will be used in B 2 Assignment.  Make sure you read the B2 assignment below so that you understand the relationship prior to starting B1.

Normative Ethics List

Autonomy: the duty to maximize the individual's right to make his or her own decisions.

Beneficence: the duty to do good both individually and for all.

Confidentiality: the duty to respect privacy of information and action.

Equality: the duty to view all people as moral equals.

Finality: the duty to take action that may override the demands of law, religion, and social customs.

Justice: the duty to treat all fairly, distributing the risks and benefits equally.

Non-maleficence: the duty to cause no harm, both individually and for all.

Understanding/Tolerance: the duty to understand and to accept other view points if reason dictates doing so is warranted.

Publicity: the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: the duty to tell the truth.

 

Ethical Dilemma Matrix:

Ethical dilemma:

Stakeholders

1

2

3

4

Step 1:  Identify the ethical dilemma based on one of the broad categories identified. An example (following here) might be to falsify your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc.  Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3:  Choose any three of the principles that might apply such as autonomy, publicity, and veracity.

Step 4: identify how the dilemma affect each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

See example, next page-
For example:

Ethical dilemma: falsifying  your profile on a social networking site

Stakeholders

Autonomy

Publicity

Veracity

1: You

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2:Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

4

Goldman, E. (May, 2007). Social Networking Sites and the Law. Retrieved from https://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf

Paper B2- Organizational Policy to address an IT-related ethical issue that you wrote about in your matrix for the B1 assignment (Individual) (12%)

Write an organizational policy to address the IT-related ethical workforce privacy issue that you described in Matrix B1, where you mapped key organizational issues and identified how these ethical issues were affected by laws, regulations, and policies. Please incorporate the instructor's feedback from the review and grade and then use the Matrix B1 you produced as a supporting document. 

The following elements must be addressed:

  1. Look at other policies to see how they are written. The following site provides examples of templates for policies but an Internet search provides other templates: https://www.sans.org/security-resources/policies/computer.php
  1. Your policy should include the following major headings:

Overview of policy

Purpose

Scope (roles and responsibilities of stakeholders)

 Policy/Procedures to follow

Sanctions/Enforcement

  1. Prepare a 3-5 page, double-spaced paper with your Organizational Policy.
  2. This assignment requires a minimum of three external references. Indicate appropriate APA reference citations for all sources you use.
  3. In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.
  4. Submit the assignment to the Assignment Folder as a MS Word File

Reference no: EM13903823

Questions Cloud

Is utilization in this mhmr similar or different than state : Write a brief conclusion statement summarizing your results. What can you tell this MHMR about the kinds of clients that use this facility? Is utilization in this MHMR similar or different than the state? What type of patient is the most frequent ..
Why is it possible to change real economic factors : Why is it possible to change real economic factors in the short run simply by printing and distributing more money? Explain why a stable 5% inflation rate can be preferable to one that averages 4% but varies between 1-7% regularly.
Discuss the impacts of globalization : Discuss the impacts of Globalization, Neoliberalism and Internationalization in Global Sustainable Development.
Design process : You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in ..
Privacy-related matrix : An opportunity to analyze a key IT-related organizational ethical privacy issue subject to relevant laws, regulations, and policies. Both of the following sites provide sources and an excellent backdrop for issues relating to privacy protection and t..
Evaluate the definite integral of this function : According to its Web site, "SpeedOf.Me is an HTML5 Internet speed test. Evaluate the definite integral of this function over the interval [0,1]. Interpret your result from #4 above. Make sure to include your unit label measurements
How aes achieves confusion and diffusion : How AES achieves confusion and diffusion. The degree to which you think AES is susceptible to each of the following attacks, a. Brute Force, b. Birthday attack, c. Timing attack, d. Algebraic attack.
Prepare a multiple-step income statement for banting co : Prepare a multiple-step income statement for Banting Corporation for calendar year 20x2, showing separately gross profit, operating profit, profit before tax and net profit.
Please write a paper for me on data warehouse : Please write a  paper for me on Data warehouse vs Data mining (8pages APA format)

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining database system of facebook and google

Does Facebook and Google use same database system? Facebook seems to run with the android platform using gmail address to retain information for user such as phone numbers and contacts.

  Evaluate the reason for the limited use of the root

Evaluate the reason for the limited use of the root or superuser account in Linux

  Stuxnet and covering tracks

Stuxnet and Covering Tracks

  You can''t keep a woman down

Read "You Can't Keep a Woman Down" by Alice Walker and write a paragraph summary. Talk about and explain the overall theme.

  Show how to the final heap created in the previous problem

1) show the result of inserting the following values one at a time into    an initially empty binary heap. (show the heap after the insert).     use trees to illustrate each heap.    42,11,28,8,13,61,18 2) show how to the final heap created in the ..

  Twenty-four voice signals

Twenty-four voice signals are to be multiplexed and transmitted over twisted pair. What is the bandwidth required (in bps) if synchronous time division multiplexing is used, if we use the standard analog to digital sampling rate, and if each sample i..

  Write the algorithm/logic for computing following problem

Given the dimensions of a crate (side 1, side 2, and side 3), find the largest surface area it can provide when used as a table.

  Analyze the fundamental impact of it architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry. Determine if IT architecture impacts the effectiveness or efficiency of information management and vice ver..

  Write an anonymous block that places a substitution variable

Write an anonymous block that places a substitution variable (&) into a local variable of type character. You should check the value entered in the local variable and output different messages depending on the value provided.

  Explain why you would want each feature

Explain why you would want each feature. Do you need to include any other devices in this design?

  The decryption algorithm

Using RSA, encode the word "cat" by encrypting each letter separately. Choose p=3, q=11 and e=9. Apply then the decryption algorithm. Show all the calculation steps.

  Analyze use of databases in business environment

Create the 2-3 page memorandum analyzing use of databases in the business environment. Include what database applications must be used: Microsoft Access, IBM DB2, Oracle, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd