Ask Question, Ask an Expert


Ask Computer Engineering Expert

Project Instructions:

You have to analyzed and discussed case studies and issues on key ethical issues in information technology. Now build your own framework for a code of ethics. You will refine your material, bring it altogether, give an overall rationale for your code, and give commentary for each part as a finished project.

Compile your research on existing codes of ethics and develop a code of ethics for information technologists. Use classical precepts and principles from ethical thinkers to justify each component of your code. This code of ethics must cover the key issues. Select one of the topics below:

A) Ownership of information. 
B) Preventing spam, email viruses and Denial-of-Service.
C) Computerized invasion of privacy. 
D) Developing policies for handling consumer information or Anonymity and identity. 
E) Plagiarism. 
F) Releasing buggy or imperfect software. 
G) Encryption Control Act.
H) Copyright Protection.

Project requirements:

Make a research paper which is 6–8 pages in length, excluding cover page, table of contents, and references. Your final paper’s content must synthesize course concepts and a review of supporting material; presents a general understanding of the selected topic. In addition, your paper must comprise:

Paper must comprise 5–7 references to existing sources to support points of position. Your sources can be from course texts or assigned readings.

All in-text citations and references are presented by using APA style and formatting guidelines. When completing your assignment, take a clear stand on whether a specific action or decision is right or wrong and then defend your position via the use of one or more of the practical ethical theories.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91850

Have any Question? 

Related Questions in Computer Engineering

What cost factors are considered when a new tool is

What cost factors are considered when a new tool is evaluated? Why is it required that the tool can be used even when the scale of your project goes up?

A how does releasing all locks at the end of the

a. How does releasing all locks at the end of the transaction relate to two-phase locking? b. In general, how should the boundaries of a transaction be defined? c. What is deadlock? How can it be avoided? How can it be r ...

Please write an essay regarding alien and ethic profiling

Please write an essay regarding Alien and ethic profiling issues in Homeland Security. Please do atleast 10 to 15 pages including references and please no plagiarism.

The problemthis problem is inspired by a question raised by

The Problem This problem is inspired by a question raised by Devashish in class. As Devashish's question pointed out, the stable marriage problem does not handles "divorces." This is because we assume everyone is interes ...

Text book - algorithm design by jon kleinberg and eva

Text Book - Algorithm Design by Jon Kleinberg and Eva Tardos Chapter 2 - Basics of Algorithm Analysis Exercises Q1. Suppose you have algorithms with the five running times listed below. (Assume these are the exact runnin ...

Exp w capstone- calypso travel club 31project

EXP W Capstone- Calypso Travel Club 3.1 Project Description: You are an employee of Calypso Travel Club, which is a timesharing resort management company. Your position requires that you encourage owner participation and ...

Toys galore currently has a credit limit of 7500 because

Toys Galore currently has a credit limit of $7,500. Because Toys Galore has an excellent credit rating, TAL Distributors is increasing the company's credit limit to $10,000. If you run the SQL query in Question 2b after ...

Can you please assist with the below assignment nbspit will

Can you please assist with the below assignment.  It will need to be prepared in Java. Programming in Java Multidimensional Arrays Assignment Greenway Consulting surveyed the employees of three companies Alhermit, Logway ...

Questionthis assignment involves creating an algorithm an

Question: This assignment involves creating an algorithm. An algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem. We will see in future weeks how the detailed steps of this type of proced ...

A explain how the query in your answer to review question

a. Explain how the query in your answer to Review Question 8.15 works. b. Why is it important to analyze the database before implementing database redesign tasks? What can happen if this is not done? c. Explain the proce ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate