discuss recent legislation related to ethical computing, Business Law and Ethics

Assignment Help:

Throughout this course, you have analyzed and discussed case studies and issues on key ethical issues in information technology. Now it is time to consider how these theories apply to your current career and field of study.

Compile your research you have completed during this course. Reflect upon how what you have learned will change the way in which you conduct yourself in your career. What laws will affect you? What ethical theories will dictate the way in which you make decisions? Think about a situation in which you may be conducting business with people in other cultures. How might your beliefs differ from theirs? Use examples and/or case studies to demonstrate your position. Make sure that you explain each idea fully and support it with the appropriate research. As you write, you may consider some of the topics below:

• Ownership of information.
• Preventing spam, e-mail viruses, Denial-of-Service
• Computerized invasion of privacy.
• Developing policies for handling consumer information or Anonymity and identity.
• Plagiarism.
• Releasing buggy or imperfect software.
• Encryption Control Act
• Copyright Protection.

Refined Project Detail

1. Analyze legal and ethical issues in the field information technology.
• Clearly analyzes and evaluates an ethical theory and is well written and provides examples.
2. Apply ethical theories to information technology case studies.
• Formulates and makes recommendations to address ethical issues and summarizes opinion based on an ethical theory.

3. Discuss recent legislation related to ethical computing.
• Researches recent legislation regarding ethical computing and formulates an opinion based on an ethical theory.

4. Evaluate differences in ethical codes of information technology conduct in different cultures.
• Evaluates and makes recommendations to address differences in ethical codes of information technology conduct in different cultures in a very clear and detailed way.


Related Discussions:- discuss recent legislation related to ethical computing

Labour laws , Labour Laws: The small units manufacturing items reserved fo...

Labour Laws: The small units manufacturing items reserved for manufacture in small scale sector do not require any prior license. This is a major relaxation where no licensing or

Who are refugees, Normal 0 false false false EN-IN X-...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4 Who are refugees

Lifting the veil of incorporation, Lifting the Veil of Incorporation: ...

Lifting the Veil of Incorporation: The legal rule that a registered company is at law a different person altogether from the subscribers to the memorandum of association and o

Contract condition, 1. What is the difference between modifying a contract ...

1. What is the difference between modifying a contract under common law and modifying a contract under the UCC? 2. What is a "waiver" and what are its implications? 3. What i

Resident magistrate''s court , Resident Magistrate's Court Establis...

Resident Magistrate's Court Establishment Further Resident Magistrate's Court is constituted through S.3 (1) of the Magistrate's Courts Act that is provides that 'ther

Reduction of capital, Reduction of Capital:   4.1 The general rule ...

Reduction of Capital:   4.1 The general rule is that it is illegal for a company to reduce its capital. This is so because such a reduction would be tantamount to reducing

What do you understand by business ethics, QUESTION 1 (1) What do you u...

QUESTION 1 (1) What do you understand by business ethics? (2) How can an ethical climate be improved in an organization? QUESTION 2 Explain the importance of stakeho

Advocates, Advocates Whether in sec 3(1) of the Interpretation and Gen...

Advocates Whether in sec 3(1) of the Interpretation and General Provisions Act cap 2 and sec 2 of the Advocates Act (1989) an advocate is a person that whose name has been dul

Analyze information security and cybercrime law issues, (A Safe Assign note...

(A Safe Assign note : All work submitted will be checked for plagiarism using an automated tool developed by Blackboard. Work will be checked against a variety of sources including

State the theories of self-enforcing, Theories of self-enforcing or implici...

Theories of self-enforcing or implicit contracts These theories relate to the problem of limits to which legal compulsion can be employed (due to information or transaction cos

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd