Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Applying Ethical Theory Value: 20% Due date: 06-May-2018 Return date: 29-May-2018 Length: XXXXXXXXXXwords Submission method options Alternative submission method Task Your lecturer will place several...

1 answer below »
Applying Ethical Theory
Value: 20%
Due date: 06-May-2018
Return date: 29-May-2018
Length:  XXXXXXXXXXwords
Submission method options
Alternative submission method
Task
Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted.
1. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.
2. Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.
3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.
 You are required to complete the following:
Write an essay:
· The word limit for the essay is XXXXXXXXXXwords. Headings, citations and references do not count towards the word limit, but quotations do.
· Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well reasoned arguments for your assessments and recommendations. 
· Write an overall conclusion that justifies your recommendations made in your essay.
· Include a Reference list at the end of your work, in the co
ect APA referencing style, co
esponding to in-text citations.
NOTE: Please use the template provided in resources section of this subject site.
Rationale
This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.
Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:
· ICT professionalism
· Privacy
· Security
· Cyber-crime
· Intellectual property
· Regulation on the internet
· Social inclusion
· Community and identity
· Pervasive and convergent computing.
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
· identify an ICT-related ethical issue from a media article or case study;
· apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
· derive logical and justifiable conclusions to resolve the ethical issue(s);and,
· apply proper academic referencing.
Marking criteria
The following marking sheet will be used to assess students' submissions.
Please check that you have met all the criteria before you submit your assignment.
 
    Criteria 
    Standards
    
    High Distinction (HD)
    Distinction (DI)
    Credit (CR)
    Pass (PS)
    Fail (FL)
    Classical Ethical Theory
(Value 60%)
    Demonstrates an excellent ability at applying ethical theories to the ethical issues.
 
    Demonstrates a good ability at applying ethical theories to the ethical issues.
    Makes a genuine attempt at applying the ethical theories to the ethical issues.  
    The ethical theories do not link well with the ethical issues.
    The ethical theories are not properly applied to the ethical issues.
    Writing & structure
(Value 20%)
    Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation e
ors.
    Well developed skills in expression & presentation of ideas.
 
Fluent writing style appropriate to assessment task/document type.
 
Grammar & spelling accurate.
    Good skills in expression & clear presentation of ideas.
 
Mostly fluent writing style appropriate to assessment task/document type.
 
Grammar & spelling contains a few minor e
ors.
    The text contains frequent e
ors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort.
    Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.
 
Grammar & spelling contains many e
ors.
    Conclusion
(Value 10%)
    Superior conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument.
    Very high standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument.
    High standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument.
    Rudimentary conclusion that provides a convincing argument.
    Sub-standard (or no) conclusion.
    Referencing
(Value 10%)
    Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.
    Very good referencing, including reference list and citations.
 
Evidence of high quality references.
    Good referencing, including reference list and citations.
 
Evidence of good quality references.
    Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor e
ors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic integrity.
    Sub-standard (or no) referencing.
Poor quality (or no) references.
Answered Same Day Apr 28, 2020

Solution

Monika answered on May 04 2020
147 Votes
Ethical theory on Security
Ethical theory on Security
hp-u
3/5/2018
Table of contents
1) Introduction
2) Utilitarianism Theory
3) Deontology Theory
4) Virtue Theory
5) Contract Theory
6) Conclusion
7) References
Introduction
In this essay, the ethical aspects of information and computer security and privacy will be reviewed. It is field of study that is distinguish good from bad and right from wrong is known as ethics. The morality of laws and social structure, human behavior, policies is analyzed by ethics. By references of ethical principle, ethicist justifies to attempt own moral judgment and also attempt to justify our moral institution about what is right or wrong. After introduction of ethics, now we focus on ethical aspects of c security of computer. The new case study is: Privacy is hit tipping point in 2016. These include relation between security of computer and national, moral importance of computer security, the nature information welfare and cyber te
orism and information security’s moral responsibilities. In information technology, in computer ethics ethical analysis of security take places. The moral responsibilities of users and professional of computer are analyzed by computer ethics. It also analyzed ethical issues for information technology development and use in public policy(Brey,2007). There are some question would be asked, they are: should there are people free to put controversial issues online without censorship. Here requirement of ethical or moral analysis. Analysis in which issues and solution are clarified. Moral analysis is done on the basis of facts and values.
Utilitarianism Theory
The ethics theory that attempt to justify and specify the moral principles and rules that is Utilitarianism.
It is also known as Consequentialism. In modern world, it is moral theory that is refined and developed. Utilitarianism has several varieties. It is assumed by consequentialism approach that action have bad consequences due to the extent of wrong action. The rightness or wrongness of a rule or an act is matter of overall goods such as health, happiness, knowledge, pleasure, desire and satisfaction. To morality, Utilitarianism theory implies that on rule means keep your promise and No moral activity such as act of stealing may be right or wrong intrinsically. The production of matter of non moral goods that results from moral rules and action and moral duty is not intrinsic means it is instrumental are defined as morality according to Utilitarianism(Moreland,2017). According to the majority of more philosopher and theologians, consequentialism is defective. Here for a detailed critique of utilitarianism are not allowed space. If utilitarianism is adopted then one of the main problem with it is justified appropriate things morally that are clearly immoral. For example...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here