Proceed according to the following instructionsidentify a

Assignment Help Computer Engineering
Reference no: EM13380339

Proceed according to the following instructions.

Identify a recent (within the last six (6) months) moral dilemma or ethically questionable situation relating to ICT that you are familiar with.

This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.

If using a workplace example, to maintain confidentiality,do not use real names.

If you use a media article you must include a copy of the media article in the Appendix of your assignment.

Undertake further research about your chosen topic to assist you in analysing and discussing it in your essay.

The components of the assignment are:

Analysis One- use the Doing Ethics Technique (DET), ensuring you address each of the DET questions;and

Analysis Two- Use the Australian Computer Society Code of Professional Conduct(or similar), relating specific clauses from this code to the ethical issue/s, you have identified.

Write an Overall Conclusion that ties the results of both Analysis One and Analysis Two together and which justifies the recommendations you have made through the two analyses.

Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations. You must include at leastfive (5)qualityreferences from different sources. Please note that these five references are in addition to those provided to you through this subject (for example, you still must reference, the DET, the ACS code, Tavani, the Interact subject lecture notes etcBUTthese referencescannotbe used as one of your five quality references from different sources). Only use references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.

Reference no: EM13380339

Questions Cloud

The australian commonwealth government has developed a : the australian commonwealth government has developed a cloud computing strategy and cloud computing policy and you as
You have no guarantees about the accuracy of the input from : you have no guarantees about the accuracy of the input from the user. you have to check all input and give helpful
Write a program called a2p1 to run in the lc-3 simulator : write a program called a2p1 to run in the lc-3 simulator. the program asks for the user to type in his or her upi. then
Part 1 you will implement a program where the computer : part 1 you will implement a program where the computer plays against a human opponent. the game will start with a
Proceed according to the following instructionsidentify a : proceed according to the following instructions.identify a recent within the last six 6 months moral dilemma or
Consider the relational schema of part of a firm database : consider the relational schema of part of a firm database below. write a sql query for each of the following
1decryption speeda certain cryptography vendor was : 1.decryption speeda certain cryptography vendor was providing an encryption technology that was breakable within 10
You have been hired as an information systems consultant to : you have been hired as an information systems consultant to examine state health centre a fictitious multi-centre state
Noticethatcorporatemanagementhasinthisexampleidentifiedandde : noticethatcorporatemanagementhasinthisexampleidentifiedanddevelopedtheconceptofaswellasdefinedtherequirementstaskmandate

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the implementation of a software application

This file contains a formatted MS Word file containing the example of project management analysis used for the implementation of the software application at The Coca-Cola Company.

  Conducting the forensic investigation

Describe the purpose of several initial reviews being conducted by forensics investigator (e.g., time lines, technical skills, procedures).

  How converting between different data system

I would like to know how I can convert from signed binary numbers to decimal values, from decimal numbers to signed magnitude, 2's complement, and short floating point format. Also, it would be better to provide examples with positive and negative..

  Changing the web-based email system

Explain an example of an email message which you could transmit to the user of this Web-based email system and that could enable you to read all of that users email.

  Recognize the the base case

What valid values could be passed as parameters to the function mystery.

  How to figure out possibly stacks, queues and trees

How to figure out  possibly stacks, queues and trees

  Questionexecute a recursive directory traversal as walking

questionexecute a recursive directory traversal. as walking the file tree you will be looking for duplicate files and

  Questionyou work for a small company that is having trouble

questionyou work for a small company that is having trouble with its two domain controllers. describe how you would

  Implementing the nested – loop join algorithm

Implement the Nested – Loop Join algorithm in any of the programming language.The solution should involve:a) Source file of application,

  What effect has the change in organizational culture

although, in a significant number of cases, these cultures have later tended to diverge radically from the founders' original ideals.

  Cache simulator lab

Find a way to simulate different cache architectures through premade address accessing files and this task includes modifying the associativity

  Recovering passwords from protected files

Recognize the mismatched file headers to the extensions and discuss the techniques you may apply in order to recover the passwords from protected files.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd