Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Scenario Analysis

This task is an individual task. Read the scenario below carefully and, using the information provided in the resources and what you have discovered by completing the earlier tasks in this module, answer the following questions:

1. Who are the stakeholders in the scenario?
2. What are the facts in the scenario? Do not copy and paste the scenario. Rather, the facts should be a numbered list of summarized, relevant points.
3. Which facts raise ethical concerns? Why?
4. What is the single major ethical dilemma that must be resolved immediately?
5. What are the rights and duties of each of the stakeholders?
6. What guidance (if any) does the Australian Computer Society's code of ethics provide in this situation?
7. How would you resolve the dilemma identified in (4) above? Justify your decision.
8. How are each of the stakeholders listed in (1) above affected by your decision?
9. What should have been done to avoid the dilemma in the first place?
10. What federal and/or state legislation currently exists in Australia that could apply in this or other similar situations? Consider any contractual obligations that may be relevant.
11. What policies and procedures, if any, should be in place at the organizational level to address this and other similar issues?

SCENARIO

The small software development company you work for has just produced a software package that incorporates the new tax laws and calculates taxes for both individuals and small businesses. Your boss knows that the program probably has a number of bugs. He also believes that the first company to put this kind of software on the market is likely to capture the largest market share. The program is being advertised widely.

You prepare a plan to minimise the impact of the buggy code but this would involve a delay in distribution of the software. Your boss suggests that this extra work is not necessary and argues that it is general industry practice to release imperfect code and that anyone who buys version 1.0 of a program knows this and will take proper precautions.

When the company ships a disk to a customer, it includes a disclaimer of responsibility for errors resulting from use of the program. The company expects it will receive a certain number of complaints, queries and suggestions for modification. The company plans to use these to make changes and eventually issue updated, improved and debugged versions of the software.

Because of bugs in the software, a number of users filed incorrect tax returns and were fined by the Tax Department.

Notes:

Your analysis should be clear and succinct. All decisions you make must be justified on moral, ethical and/or legal grounds. You must make reference to appropriate Australian laws as well as appropriate clauses of the ACS Code of Ethics and the Code of Professional Conduct and Professional Practice (don't quote them, simply cite and reference them). You must use correct English to a professional standard and your submission must meet the normal academic requirements for citations and referencing.

https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734582/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734578/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734586/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734585/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734584/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734583/View
https://d2l.deakin.edu.au/d2l/le/content/119211/viewContent/1734581/View
www.deakin.edu.au


Attachment:- ASSIGNMENT.rar

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9891571
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Engineering

List and describe the threats posted to information

List and describe the threats posted to information security and common attacks associated with those attacks

Service set identifier ssid also known as the wireless

Service Set Identifier (SSID), also known as the wireless network name, identifies the wireless network. An SSID is configured on the wireless AP (on the access point for the infrastructure mode) or on an initial wireles ...

Examine the us passenger airline industry using the five

Examine the U.S. passenger airline industry using the five forces. Is this an attractive industry? Why or why not?

Question questions 1 - 3 are related to singly linked list

Question: Questions 1 - 3 are related to "singly linked list". You must type your answer. 1. What are the fundamental operations of a linked list? 2. What is the main advantage of a linked list over an array? 3. What is ...

Question what is the smallest value of n such that an

Question : What is the smallest value of n such that an algorithm whose running time is 1000n 2 runs faster than an algorithm whose running time is 4 n & on the same machine? Justify your answer. The response must be typ ...

Command to mail only the process id of running java program

Command to mail only the process ID of running Java program test to the email address (single line Unix)

Question suppose alice bob and carol want to use secret key

Question : Suppose alice, bob and carol want to use secret key technology to authenticate each other. If they all use the same key, K, then bob would impersonate carol to alice. suppose instead that each had their own se ...

Explain a situation using the supply and demand for skilled

Explain a situation using the supply and demand for skilled labor in which the increased number of college graduates leads to depressed wages. Given the rising cost of going to college, explain why a college education wi ...

What are some skills individuals who work in the field of

What are some skills individuals who work in the field of cyber security need to prevent hacks in to a company's computers?

Question summarize the human-computer interface hci of

Question : Summarize the human-computer interface (HCI) of Microsft Word 2013 and Microsoft Visio 2013. Explain the importance of HCI and usability of the software. Be sure to note any commonalities between the applicati ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As