Write an essay on the topic dr google health risk

Assignment Help Basic Computer Science
Reference no: EM131127412 , Length: 950 Words

Topic : Dr. Google Health Risk

Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted.

1. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.

2. Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.

3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.

You are required to complete the following:

Write an essay:

  • The word limit for the essay is 1,000 words ± 10%. Headings, citations and references do not count towards the word limit, but quotations do.
  • Analyse the article/case study from the perspective of at least two different classical ethical theories, one of which must be that of "Just Consequentialism". Present well reasoned arguments for your assessments and recommendations.
  • Write an overall conclusion that justifies your recommendations made in your essay.
  • Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.

Rationale

This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.

Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:

  • ICT professionalism
  • Privacy
  • Security
  • Cyber-crime
  • Intellectual property
  • Regulation on the internet
  • Social inclusion
  • Community and identity
  • Pervasive and convergent computing.

Assignment 2 Template

Use the following headings for Assignment 2

1. The Scenario

Describe the scenario by giving all the facts of the case here in logical order. This is like a story reported in the newspaper.

2. The Stakeholders

Write a numbered list of all participants in the scenario.For each stakeholder say what actions he did or what actions were done to him.

3. Ethical Issues

List all the actions from section 2 above that ethically dubious, i.e. that are possibly unethical. These are called the ethical issues of the scenario which your report will evaluate to decide whether they were ethically correct or not.There may be only one ethical issue to consider or there may be several.

4. Non-Ethical Issues

List the actions from section 2 above which are not questionable, that is those actions that do not worry us. These are called the non-ethical issues and we will not analyse those actions for ethical validity.

5. Consequences

List numerically the consequences on the stakeholders of the scenario of the ethical issues listed in section 3 above.

6. Code of Ethics Implications

Use the 6 Principles of the ACS Code of Ethics to see whether the stakeholders who caused the ethical issues were unethical according to the standards of the ACS.

7. Options

In this section you must give a numerical list of you suggestions for resolving the Cyberethics issues in this scenario. Give 5 or 6 suggestions for consideration. They don't all have to be great suggestions.

8. Conclusions

This is the only section where you may give your personal opinion. Your personal opinion should be that you recommend one of the options listed in section 7. You must back up your personal opinion with good reasoning and explanations in this section.

9. References

Here you must list 6 or more references all in the APA format, and two of which must be academic references. You can find suitable academic references at the end of every chapter of the Tavani text book. Tavani's references however are not in the APA format and therefore you must reformat those references. You should also reference the Tavani text book, the class pdf notes from the text book, the ACS Code of Ethics documents on the web and my class handouts.

Reference no: EM131127412

Questions Cloud

How is the charge on the inner surface of sphere affected : If the charge at the center of the sphere is made positive, how is the charge on the inner surface of the sphere affected? (Select all that apply.)
Also indicate whether the items in error will be overstated : The balance sheet as of February 28. Also indicate whether the items in error will be overstated or understated.
Nonprofessionals can do the work of professionals : If we believe nonprofessionals can do the work of professionals, aren't we setting them up for failure?
The emission or absorption of visible light : An imaginary atom has just 3 energy levels: 0 eV, 1 eV, and 3 eV. Draw an energy-level diagram for this atom. Which portions involve the transitions involve the emission or absorption of visible light
Write an essay on the topic dr google health risk : Topic : Dr. Google Health Risk
How long does the project take to complete : How long does the project take to complete? We ask the engineer working on activity A to factor in uncertainty in activity times and to provide better estimates of the activity times. The engineers tell us that activity A takes 1 week 50% of the time..
The balance in the unearned fees account : The balance in the unearned fees account, before adjustment at the end of the year, is $38,375. Journalize the adjusting entry required if the amount of unearned fees at the end of the year is $17,200.
Calculate the circular velocity of jupiter : Calculate the circular velocity of Jupiter and the Earth in units of km/s. (use .67 x 10-11 m3/kg/s2, kg, .2 AU, and .0 AU)
Calculate the amount of heat flowing per second : Calculate the amount of heat flowing per second through a cross-section of the bent part if the total heat taken out per second from the end at 100°C is 130 J.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What was the price of each type of candy

She spent a total of $40.10. Tommy spent $39.60 on 6 sticks of gum, 4 suckers, and 10 bags of jelly beans. Finally, Janet bought 7 sticks of gum, 10 suckers, and 8 bags of jelly beans for 44.50. What was the price of each type of candy?

  Make the color of the text lightblue

Write a CSS rule that gives h1 and h2 elements a padding of 0.5 ems, a dashed border style and a margin of 0.5 ems.

  Determine the needs of the organization

Describe the steps you would take to determine the needs of the organization (the discovery of the network devices

  Code scheme to meet marketing managers requirements

Design a code scheme that will meet the marketing managers stated requirements.

  Computing downtime in telephone per year

Telephone system has an availability of 99.999 percent. How much downtime is that per year? Express your answer in a way that is easy for someone to understand.

  Identify the security advantages of cloud-based solutions

A.Identify the security advantages of cloud-based solutions. B.Identify the security disadvantages if cloud-based solutions.

  Perform a specific network forensics process

Find a video that shows how to perform a specific network forensics process, summarize the video, and attach it to your discussion. As an investigator, why do you need to know how to do network forensics?

  Financial audits more publicized than security audits

1. Why are financial audits more publicized than security audits? Should it be the other way around? 2. Discuss how the expertise of the practitioners and researchers (computer scientists, engineers, mathematicians) may affect IS integration.

  Counting massless gauge fields

Consider a string compactification where k coordinates are made into circles of critical radius. Describe the candidate ground states of this theory, and give the expression for the Hamiltonian.

  The village of marengo conducted a census

But instead of writing your pseudocode/program for "fewer than 300" households, write your pseudocode/program for EXACTLY 7 households.

  Discuss the legal theories used by the plaintiff to recover

products liability research paper due week 10 and worth 250 points select a company that has been the subject of a

  Address the benefits and disadvantage of unix@,linux@

Programmability - address the benefits and disadvantages of using UNIX® or Linux® versus Microsoft® Windows Server® within the organization, then propose one of the products

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd