Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

An article from the press that cover any of the following topics, for example there have been many articles in the media recently about government surveillance.

• ICT professionalism
• Privacy
• Security
• Cyber-crime
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing

You are required to complete the following:

Step 1. Construct a diagram using Rationale to map the arguments about a moral claim that you have identified in the article/case study:

• Include all supporting and objecting claims. These claims should include facts collated from your own research, classical ethical theories that support or object to the claim and ACS codes that are in conflict with the claim

• You are expected to 'finish off' the case's arguments, turning it into a valid and properly structured argument.

• You should use information from the article/case study, other sources discovered during your research, and your own reasoned arguments. A balanced and impartial argument is the objective.

• All arguments must obey the Golden Rule, Rabbits Rule, Holding Hands Rule and the Pyramid Rule.

• The main claim/conclusion must be an ethical claim.

Step 2. Write an essay, which maps closely to the Rationale diagram that you constructed in Step 1.

• All the claims shown on the Rationale diagram must appear in the essay, and all claims made in the essay must appear on the Rationale diagram. The essay must present all the detailed information that the Rationale diagram cannot.
• Remember to analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

Step 3. Write an overall conclusion that justifies your recommendations made in your essay.

Reference list:  APA referencing style

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9741457
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

A firm produces product a and product b this years sales

A firm produces Product A and Product B. This years sales price of Product A have decreased tremendously, and the sale of Product B has increase by 10 percent. The firm has threeemployees that can produce Product A and f ...

Explain that when an unauthorized individual gains access

Explain that when an unauthorized individual gains access to the information an organization trying to protect, that act is categorized as a deliberate act of espionage or trespass.

Wat type of malware do you think is the most destructive

What type of malware do you think is the most destructive : viruses, worms, trojan programs, spyware or adware.

A student ran numerical simulation on a dual-core computer

A student ran numerical simulation on a dual-core computer (3.2 GHz, 2MB Smartcache, 32GB RAM). Each simulation involve calculation of 2GB of data and takes about 3 hours. To speed up the calculation, he ran two simulati ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

One of the 5 halogens which are diatomic has the fastest

One of the 5 halogens (which are diatomic) has the fastest root mean square velocity at STP. Calculate this velocity in meters per second.

Question a show the results of inserting 10 12 1 14 6 5 8

Question : a) Show the results of inserting 10, 12, 1, 14, 6, 5, 8, 15, 3, 9, 7, 4, 11, 13, and 2, one at a into an initially empty binary heap. Show the tree at each stage. b) Show the result of performing three DeleteM ...

System analysis and designbarbara singleton manager of

system analysis and design. Barbara Singleton, manager of western regional sales at the WAMAP Company, requested that the IS department develop a sales force management and tracking system that would enable her to better ...

You have been offered a contract worth 1 million per year

You have been offered a contract worth 1 million per year for five years. However, to take the contract, you will need to purchase some new equipment. Your discount rate for this project is 12%. You are still negotiating ...

Regarding sorting lists an algorithm such as quicksort was

Regarding sorting lists, an algorithm such as QuickSort was preferred if the list was, for the most part, in random order, and that an algorithm such as Insertion Sort was preferred if the list was essentially in order. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As