Ask Question, Ask an Expert


Ask Computer Engineering Expert

Project Instructions:

You have to analyzed and discussed case studies and issues on key ethical issues in information technology. Now build your own framework for a code of ethics. You will refine your material, bring it altogether, give an overall rationale for your code, and give commentary for each part as a finished project.

Compile your research on existing codes of ethics and develop a code of ethics for information technologists. Use classical precepts and principles from ethical thinkers to justify each component of your code. This code of ethics must cover the key issues. Select one of the topics below:

A) Ownership of information. 
B) Preventing spam, email viruses and Denial-of-Service.
C) Computerized invasion of privacy. 
D) Developing policies for handling consumer information or Anonymity and identity. 
E) Plagiarism. 
F) Releasing buggy or imperfect software. 
G) Encryption Control Act.
H) Copyright Protection.

Project requirements:

Make a research paper which is 6–8 pages in length, excluding cover page, table of contents, and references. Your final paper’s content must synthesize course concepts and a review of supporting material; presents a general understanding of the selected topic. In addition, your paper must comprise:

Paper must comprise 5–7 references to existing sources to support points of position. Your sources can be from course texts or assigned readings.

All in-text citations and references are presented by using APA style and formatting guidelines. When completing your assignment, take a clear stand on whether a specific action or decision is right or wrong and then defend your position via the use of one or more of the practical ethical theories.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91850

Have any Question? 

Related Questions in Computer Engineering

Design and implement an algorithm that accepts as input an

Design and implement an algorithm that accepts as input an ordered list of search names. The task required is to establish and report the absence or presence of these search names in a second much longer ordered list.

1 what is a hash function and what can it be used for2 why

1. What is a hash function, and what can it be used for? 2. Why is it important to exchange keys out of band in symmetric encryption? 3. What is the fundamental difference between symmetric and asymmetric encryption?

Computing modular exponentiation efficiently is inevitable

Computing modular exponentiation efficiently is inevitable for the practicability of RSA. Compute the following exponentiations xe mod m applying the squareand-multiply algorithm: After every iteration step, show the exp ...

Consider a game tree in which there are six marbles and

Consider a game tree in which there are six marbles, and players 1 and 2 take turns picking from one to three marbles. The player who takes the last marble loses the game. a. Draw the complete game tree for this game. b. ...

Assignment 1 identify a firm with an it budgeting process

Assignment 1: Identify a firm with an IT budgeting process you are familiar with. Using the material in the text and that from your external research, write a paper in which you re-engineer the firm's budget process. You ...

The work of an it department is never finished the wvcc

The work of an IT department is never finished. The WVCC network administrators and student assistants have many plans for the next network upgrade. Their main concern at this point is availability. Although the hierarch ...

Components of a telecommunication system and basic computer

Components of a Telecommunication System and Basic Computer Network Components are major components of a business : What are the main differences of these two systems? Do you need to have both of them to support your com ...

1 in tcp does a fin segment close a connection in only one

1. In TCP, does a FIN segment close a connection in only one direction or in both directions? 2. In TCP, what type of flag can totally close the communication in both directions? 3. Most of the flags can be used together ...

1 if you were setting up an encryption-based network what

1. If you were setting up an encryption-based network, what size key would you choose and why? 2. What is the average key size of a strong encryption system in use today?

In this project you will enhance the bankaccount class and

In this project, you will enhance the BankAccount class and see how abstraction and encapsulation enable evolutionary changes to software. Begin with a simple enhancement: charging a fee for every deposit and withdrawal. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro