Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

Project Instructions:

You have to analyzed and discussed case studies and issues on key ethical issues in information technology. Now build your own framework for a code of ethics. You will refine your material, bring it altogether, give an overall rationale for your code, and give commentary for each part as a finished project.

Compile your research on existing codes of ethics and develop a code of ethics for information technologists. Use classical precepts and principles from ethical thinkers to justify each component of your code. This code of ethics must cover the key issues. Select one of the topics below:

A) Ownership of information. 
B) Preventing spam, email viruses and Denial-of-Service.
C) Computerized invasion of privacy. 
D) Developing policies for handling consumer information or Anonymity and identity. 
E) Plagiarism. 
F) Releasing buggy or imperfect software. 
G) Encryption Control Act.
H) Copyright Protection.

Project requirements:

Make a research paper which is 6–8 pages in length, excluding cover page, table of contents, and references. Your final paper’s content must synthesize course concepts and a review of supporting material; presents a general understanding of the selected topic. In addition, your paper must comprise:

Paper must comprise 5–7 references to existing sources to support points of position. Your sources can be from course texts or assigned readings.

All in-text citations and references are presented by using APA style and formatting guidelines. When completing your assignment, take a clear stand on whether a specific action or decision is right or wrong and then defend your position via the use of one or more of the practical ethical theories.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91850

Have any Question? 


Related Questions in Computer Engineering

Assignment objective to develop a simple but attractive

Assignment OBJECTIVE: To develop a simple but attractive webpage using CSS and following HCI criteria. CASE STUDY - A new profile website for academics at the School of Computer Science and Electronic Engineering, Univer ...

1 how is a repeater different from an amplifier2 what do we

1. How is a repeater different from an amplifier? 2. What do we mean when we say that a switch can filter traffic? Why is filtering important? 3. What is a transparent switch? 4. How is a hub related to a repeater? 5. Wh ...

1 what is the bandwidth of a signal that can be decomposed

1. What is the bandwidth of a signal that can be decomposed into five sine waves with frequencies at 0, 20, 50, 100, and 200 Hz? All peak amplitudes are the same. Draw the bandwidth. 2. A periodic composite signal with a ...

You receive a computer system from the officer who tagged

You receive a computer system from the officer who tagged and bagged the evidence at a crime scene in a suspects home. You examine the computer and discover that is uses SCSI (small computer system interface) drive on Wi ...

1 assume a private internet uses a protocol suite totally

1. Assume a private internet uses a protocol suite totally different from the TCP/ IP protocol suite. Can this internet still use the services of UDP or TCP as an end-to-end vehicle of message communication? 2. Can you e ...

You are currently working for a company with outdated

You are currently working for a company with outdated multimedia tools. Give proposal to your manager that includes the following: An overview describing how multimedia has evolved The tools or protocols you recommend fo ...

Let m and c be random variables that take values from the

Let M and C be random variables that take values from the set of possible plaintexts and the set of possible ciphertexts for some cryptosystem. Prove that the cryptosystem provides perfect secrecy if and only if p(M | C) ...

1 search your librarys database and the web for an article

1. Search your library's database and the Web for an article related to individuals violating their organization's policy and being terminated. Did you find many? Why or why not? 2. Go to the (ISC)2 Web site at www.isc2. ...

The use of the student file reader adt makes it easy to

The use of the Student File Reader ADT makes it easy to extract student records from a text file no matter the format used to store the data. Implement a new version of the ADT to extract the data from a text file in whi ...

1 what are some advantages of testing a new network design

1. What are some advantages of testing a new network design component on a production network during normal business hours? What are some disadvantages of taking this approach? 2. What is regression testing? Why is regre ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen