Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
IT-Related Ethical Issue IFSM304
The following five components must be addressed in this paper:
Describe a current ethical concern in the field of information technology: Because this is a paper exercise rather than a real-life situation, you might wish to create a brief scenario in which this issue arises and poses an ethical dilemma. It could be a problem for you, your family, your career, or your company, or it could be a subject of public policy or law that affects the entire population. A list of possible issues that could lead to ethical dilemmas can be found in the list below.
Define a brief problem statement based on the description or scenario provided above. It’s better if you explain a specific problem produced by the dilemma, which necessitates a certain ethical decision, which will resolve the dilemma. Be mindful that if the issue is one of public policy or law, taking action to enact a solution may necessitate the involvement of a regulatory organization or congressional approval.
Analyze your problem using one of the Module 2 structured decision-making frameworks. Make sure you know what decision-making framework was used. In addition, the primary categories in the Analysis section must be picked from the steps in the decision-making framework.
Consider and state the influence of your decision on an individual, an organization, stakeholders, customers, and suppliers, as well as the environment, if appropriate!
Declare and discuss the ethical theory from Module 1 that you used to make your decision.
In regards to your paper:
Prepare a three- to five-page, double-spaced paper and send it as an attached Microsoft Word file to the LEO Assignments Module.
For each topic criteria, use headers.
All sources you utilize should have appropriate American Psychological Association (APA) source citations. Your work should demonstrate accurate language and spelling, solid structure, and proper business-writing style, in addition to critical thinking and analysis skills.
Include a cover page with your name, the class name, and the paper’s title.
Kidder’s method, for example, consists of nine steps:
Recognize that a moral issue exists.
Determine the actor (what is the moral dilemma?).
Collect the necessary information.
Check for concerns of right and wrong.
Check for right-versus-wrong paradigms (what kind of conundrum is this?).
Apply the principles of resolution (ends-based, rule-based, or care-based).
Examine the “trilemma” alternatives (look for common ground or compromise).
Make your choice.
Reconsider and reconsider your decision. 183-187) (Kidder, 1995).
Reminder: In the Analysis portion of your paper, each of the steps for whatever framework you use must be a significant heading.
Here are some suggested topics for you to think about, with additional language to help you flesh out the issue:
What’s New in the World of Web Privacy: What’s New in the World of Web Privacy? Consider current instances of abuse and improvements. Describe and assess Web site policies, technological and privacy policy safeguards, and current government regulatory plans.
Other Countries’ Personal Data Protection Laws: Personal data privacy rules, Web site privacy policies, and government/law enforcement access to personal data in one or more nations; for example, the European Union. This is increasingly important as our global economic community grows and we become more reliant on non-US clientele for Internet e-business.
Computer-Assistant Crimes: Talk about the most common sorts of cyber crimes, such as phishing. Examine why and how these things happen. Describe any safeguards that could be used to help prevent or mitigate these types of crimes.
Surveillance of the Internet by the Government: Following the 2001 terrorist attacks in the United States, various new laws were enacted, allowing for increased government surveillance of the Internet. Is this a viable option?
The Digital Divide: What Is It? Is it real, what does it look like, and what are the ethical implications and consequences?
Workplace Privacy – Surveillance Web and e-mail accounts for employees What are the current views on the surveillance of employee computer usage? What policies do employers have in place? Should this surveillance practice be allowed or not?
Medical Confidentiality: Who is the owner of your medical records? What is the status of existing legislation aimed at safeguarding your personal health information? Is that enough? With government stimulus funding, health care companies now have new incentives to develop and utilize digital health records.
Piracy of software: How many of you have ever copied software without permission, downloaded software or music (for free or for a fee), or used copyrighted information without giving proper credit or seeking permission? Was this unethical or simply plain wrong? What steps are being taken to address this?
Consumer profiling (nine): Your tastes are profiled with every purchase you make and every Web site you visit. What are your thoughts on these organizations’ legal authority to gather and aggregate this data?
Ethics and Biometrics: Your fingerprint, retinal-vessel image, and DNA map can all be stored in a computer, on a network, or in the infosphere as a digital image. What new and old ethical issues do we need to address?
What are some of the ethical difficulties that come up when using new social networks? How are these now seen as suitable for business use? What is the definition of a business social community? Are new/different security and protections required for these networks?
Is it permissible to gamble in cyberspace? Are there any national restrictions or licensing requirements? What are the requirements for oversight and enforcement? Are there any repercussions on a global scale? What are the social and public health challenges that need to be addressed?
Pornography on the Internet: For example, the United States Supreme Court recently ruled that computer-generated child pornography is protected as free expression.
Medicine and Psychiatry in the Digital Age: Privacy issues; security; third-party record-keeping; electronic medical records; access to information, even by the patient (patient rights); access to information by outsiders without the patient’s knowledge; authority to transmit and/or exchange information are just a few of the topics to address. Is there any policy that professional groups have proposed?
Information Systems and Counter-Terrorism: Your rights vs. your protection
Closed-source vs. Open-source Software: What’s the Difference? Implications for intellectual property law and ethical implications
Licenses under the Creative Commons Attribution-Noncommercial-No Derivative What are the legal and ethical implications and concerns, and how do they work?
What is the US government’s general position on issuing each individual with a unique identification card? Which US government entities have already issued a one-of-a-kind ID card? What initiatives have been taken to electronically include individual ID information in passports? What methods are used to ensure privacy and security?
Is playing video games a good way to get away from your daily responsibilities? Is there a link between video games and real-world violence? Why do game designers keep ramping up the brutality in their games? What is the definition of video game addiction?
What exactly is cyberbullying, and what can be done to combat it?
What is the federal government’s current position on net neutrality, and is it fair to all?
Here’s a link to the textbook: https://courses.lumenlearning.com/boundless-management/
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow
IT-Related Ethical Issue IFSM304 |