Ask Question, Ask an Expert


Ask Computer Engineering Expert

Project Instructions:

You have to analyzed and discussed case studies and issues on key ethical issues in information technology. Now build your own framework for a code of ethics. You will refine your material, bring it altogether, give an overall rationale for your code, and give commentary for each part as a finished project.

Compile your research on existing codes of ethics and develop a code of ethics for information technologists. Use classical precepts and principles from ethical thinkers to justify each component of your code. This code of ethics must cover the key issues. Select one of the topics below:

A) Ownership of information. 
B) Preventing spam, email viruses and Denial-of-Service.
C) Computerized invasion of privacy. 
D) Developing policies for handling consumer information or Anonymity and identity. 
E) Plagiarism. 
F) Releasing buggy or imperfect software. 
G) Encryption Control Act.
H) Copyright Protection.

Project requirements:

Make a research paper which is 6–8 pages in length, excluding cover page, table of contents, and references. Your final paper’s content must synthesize course concepts and a review of supporting material; presents a general understanding of the selected topic. In addition, your paper must comprise:

Paper must comprise 5–7 references to existing sources to support points of position. Your sources can be from course texts or assigned readings.

All in-text citations and references are presented by using APA style and formatting guidelines. When completing your assignment, take a clear stand on whether a specific action or decision is right or wrong and then defend your position via the use of one or more of the practical ethical theories.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91850

Have any Question? 

Related Questions in Computer Engineering

Name the document measurements1xsda xml declaration should

Name the document measurements1.xsd. A XML declaration should be the first line. This should list version 1.0 and an encoding of UTF-8 The XML Schema Namespace should use "" in its declara ...

Consider the following problem descriptionemployees receive

Consider the following problem description: Employees receive their biweekly paychecks. They are paid their hourly rates for each hour worked; however, if they worked more than 40 hours per week, they are paid at 150 per ...

Create and test a set class to represent a classical set

Create and test a Set class to represent a classical set. Your sets should support the following methods: Set(elements) Create a set (elements is the initial list of items in the set). addElement(x) Adds x to the set. de ...

1 what is the difference between half-duplex and

1. What is the difference between half-duplex and full-duplex transmission modes? 2. Name the four basic network topologies, and cite an advantage of each type. 3. For n devices in a network, what is the number of cable ...

The cost to become a member of a fitness center is as

The cost to become a member of a fitness center is as follows: The senior citizens discount is 30% If the membership is bought and paid for 12 or more months, the discount is 15% If more than five personal training sessi ...

Implement a class quiz that implements the measurable

Implement a class Quiz that implements the Measurable interface. A quiz has a score and a letter grade (such as B+). Use the implementation of the DataSet class in Section 9.1 to process a collection of quizzes. Display ...

1 the second line of the web server starting script puts

1. The second line of the Web server starting script puts the process ID number of the Web server wrapper into a file. Why? 2. This exercise reconsiders the use of NIS to distribute user information such as password hash ...

1 fill in the blanks the 835 mhz bandwidth in bluetooth is

1. Fill in the blanks. The 83.5 MHz bandwidth in Bluetooth is divided into_____ channels, each of ______ MHz. 2. What is the spread spectrum technique used by Bluetooth? 3. What is the modulation technique in the radio l ...

In computer science when we encounter an algorithm we often

In computer science, when we encounter an algorithm, we often need to ask about the complexity of that algorithm (how many computations we need to do). To find the complexity of the distance vector's algorithm, find the ...

1 list the devices that can be used in a wireless network

1. List the devices that can be used in a wireless network. How are they connected to form a wireless network? 2. Infrared devices exchange beams of light to communicate. Is this the method used in wireless communication ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen