Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Could you solve it

1 answer below »
Assessment Details and Submission Guidelines
    Trimeste
    T1, 2022
    Unit Code
    BN201
    Unit Title
    Professional Issues of Information Technology
    Assessment
Autho
    Mr. Min P Gurung
    Assessment
Type
    Assignment 2 - Group Report
    Assessment
Title
    Ethical issues arising from use of ICT technologies
    Purpose of
the assessment (with ULO Mapping)
    This assignment assesses the following Unit Learning Outcomes; students should be able to
demonstrate their achievements in them.
a. Explain management concepts applied in ICT organisations and society;
c. Interpret ethical, professional standards and codes of practice to ICT systems;
d. Understand the importance of team work, collaboration and life-long learning in the workplace.
    Weight
     25%
    Total Marks
    70
    Word range
     XXXXXXXXXX
    Due Date
    Week-11 Sunday, 01/06/2022 at 23:59 PM.
    Submission
Guidelines
     All work must be submitted on Moodle by the due date along with a completed Assignment
Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
 Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
    Extension
     If an extension of time to submit work is required, a Special Consideration Application must be submitted online to AMS follow the link below you may require to login. You must submit this application three working days prior to the due date of the assignment.
https:
online.mit.edu.au/ams/PublicDocs/Student/MIT_Special_Consideration_Application.pdf
    Academic
Misconduct
     Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: https:
www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure For further information, please refer to the Academic Integrity Section in your Unit Description.
Prepared by: Mr. Min P Gurung    Moderated by: Dr. Sadia Aziz    May, 2022
Prepared by: Mr. Min P Gurung    Moderated by: Dr. Sadia Aziz    May, 2022
Assignment Description
Students should form a group of three (3) students from the same laboratory class. You must not change the group membership unless approved by your tutor. Tutor will then allocate one of the topics listed in Table 1 to each group.
All students must collaborate in this group assignment and contribute equally. Group leader should report their progress on a weekly basis to relevant tutor. Every student must participate in peer assessment on the Spark- Plus system.
Table 1: List of topics for Assignment-2.
Topic 1: Cybersquatting: Is It Entrepreneurship or Intellectual Theft?
“Just before the 2000 New York senatorial campaign, Chris Hayden paid $70 each for the exclusive
2-year rights to the following Internet addresses: www.hillary2000.com, www.hillaryclinton2000.com, and www.clinton2000.com. A few weeks later, Mrs. Hillary Clinton, the then US first lady, declared her candidacy for the state of New York senatorial race. The Clinton campaign team wanted her presence on the web, but they could not use any of the three names, though they rightly belonged to Mrs. Clinton. Deciding not to challenge Mr. Hayden in the middle of an election campaign, the team opted to buy the rights for www.hillary2000.com from Mr. Hayden. However, Mr. Hayden decided to engage a
oker to demand $15,000 for the use of the name”.
“Cybersquatting, as the practice of gra
ing somebody’s name and registering it with an Internet registration company in anticipation of reaping huge rewards, is becoming widespread”. [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on Intellectual Property Right (IPR) raised in the case.
Topic 2: Electronic Surveillance and the Bodyguard
“Jon Kiggwe is a young aggressive entrepreneur, with a
ight future. With several businesses doing well and a few start-ups with promising financial status, Jon is on his way to making a million dollars before his 25th birthday. Jon’s business meetings take him into tough neighborhoods. So, for him to feel secure, Jon uses a team of professional security bodyguards to shadow him almost 24 hours a day”.
“In his big 10 million dollar home, Jon receives a stream of guests, including both business associates and friends. His bodyguards, besides keeping an eye on him, also see to the orderly a
ival and departure of the guests. Because of this, the bodyguards keep a permanent office and sleeping quarters at Jon’s mansion”.
“Without informing them, Jon installed video recording and listening gadgets in the guards’ office and sleeping quarters to record their every conversation and movement. He feels safe that way!” [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on IT surveillance and social implications raised in this case.
BN201
Professional Issues of Information Technology
Page 4 of 5
2Prepared by: Mr. Min P Gurung
Moderated by: Dr. Sadia Aziz
May, 2022
Topic 3: Who Will Pay the Price for Flawed Software?
“Peter Efon works as a programmer for a major software company. The company, Cybersoft, is launching itself to be a major Internet-based platform developer and it is soon to launch a web initiative. Peter is involved in the development of a crucial component of the initiative. The company has trust in Peter for he has worked for it since he left college 15 years ago. Since his a
ival at the company, Peter has pioneered a number of major software development projects. Peter has followed, and is very much aware of, the losses suffered by other businesses due to defective software. He even knows that in 2000, US companies suffered a whopping $100 billion loss due to bad software. He and his company, Cybersoft, are determined to target quality as the major focus of their new web initiative. Peter dreams of the success of the web initiative and the recognition it might
ing both to his company and him. However, a few days before the launch of the much-awaited initiative, as Peter makes his final quality checks, he discovers a flaw in the core component of the initiative whose magnitude he could not determine. To do so would mean a few weeks delay at best, a major blow to the company’s efforts. The company had mounted an advertising blitz on all major media outlets. Even a few weeks delay would cause major financial losses and the public’s loss of confidence in the right company. This must never happen. Peter decides to see to it”. [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on the role of risk management in software systems design and construction raised in his case.
Marking criteria:
You must use the following aspects as headings for your report.
    Aspects
    Description of the section
    
    Marks
    
1. Introduction to the case
scenario
    
Introduce the ethical issue/s that arise in the case/scenario.
    
    
10
    
2. Analysis of ethical issues using ethical theories framework
    
Conduct an ethical analysis using ethical theories framework (consequence, duty, contract and character based theories)
Relevance of each theory – 5 Marks*3 = 15 Marks.
Use ethical principles from these theories, apply it to the scenario, and conduct your analysis.
Ethical principal applied – 5*3 = 15 Marks
Arguments need to be stated clearly and backed up using peer-reviewed sources. (5 Marks)
    35
    
3. Discussion your findings
    
Discuss your findings here in detail refe
ing to ethical frameworks (see above).
    
    
10
    
4. Conclusion
    
Write a nice concluding remarks of overall report. No new information should be included in the conclusion
    
10
    
5. Referencing
    
IEEE referencing style
    
    
5
    
    
    
Total
    
70
Marking Ru
ic:
    Grade
Mark
    HD
80-100%
    DI
70-79%
    CR
60-69%
    P
50-59%
    Fail
50%
    
    Excellent
    Very Good
    Good
    Satisfactory
    Unsatisfactory
    Introduction to
the case/scenario
10
    Information is
Excellent. Case is explained very succinctly
    Case
information is clearly presented
    Case
explanation is presented and good attempt at it
    Case
explanation is satisfactory
    Case is not clear.
Hard to follow
    
    peer reviewed academic sources
    explained using academic sources
    are explained. Academic sources are not integrated fully
    need to be justified clearly
    Ethical values are not discussed
    Analysis of
ethical issues using ethical theories framework
35
    Logic is clear and
easy to follow with strong arguments. Excellent integration of ethical theories in the context of the case
    Very good
discussion of ethical theories in the context of the case supported through academic argument
    Good attempt
at explaining the ethical theories in the context of the case using
some academic
sources
    Ethical theories
are integrated within the case to some extent. However requires more extensive work
    No evidence of
ethical theories and their relevance to
the case
    Discussion of
your findings
10
    Excellent
discussion of findings in the case study. Clear justification of
their final decision
in the case using arguments
    Very good
discussion of findings in the case
study. Final decision in the case explained
    Good attempt
at discussion of findings in the case. Final decision is
listed but
equires more work
    Made some
effort in discussing the case study findings. No clear evidence of justification of decision
    Poor discussion
of findings. Lacks coherence and justification
    
Conclusion
10
    Conclusion is
excellent offering insights in to the case and summary of report
    Conclusion
is very good and
provides
insights in to case and summary of work
    Conclusion
discusses the case and major findings
    Conclusion
includes summary of work but requires more work
    Conclusion is
not written very well and has new information
    Referencing
5
    Clear styles with
excellent source of references.
    Clea
eferencing style
    Generally good
eferencing style
    Sometimes
clear referencing style
    Lacks
consistency with many e
ors
Answered 15 days After May 16, 2022

Solution

Abishek A answered on May 24 2022
102 Votes
Topic 3: The role of Risk Management in Software Systems Design and Construction
Introduction:
Every software project contains an element of uncertainty known as project risk and the success of the project totally depends on the project manager's ability to identify, prioritize, access and mitigate such risks involved. A framework for managing risks in software development from the developers' perspective is necessary, since software developers incur considerable amounts of risks.
Most of the software projects are considered risky as a result of the various potential problems that might arise. Project coordinator or project managers need to be experienced to identify risks involved. [5]
In project management, risk management is a comprehensive high-level management. Various methods are used to identify, analyze, and control risks caused by uncertainty. In the risk analysis, the main focus is on technical risk, equipment quality, and the reliability of the project.
As per the case study presented, Peter has a combined experience of 15+ years and has pioneered various software projects. An individual well suited for the project manager's position.
Since a major flaw was found during the final analysis of the core component he was responsible for, all that’s left is to prioritize the same and mitigate the said e
or.
Analysis:
A software during its infancy is plagued by a plethora of bugs and e
ors which render it unusable for a substantial amount of time unless the said bugs are resolved. These bugs later after being resolved tend to give rise to other bugs in some instances.
A software manager’s expertise plays a crucial role in mitigating the latter bugs generated throughout the entirety of the program. These include the alignment of syntax or contextual data which might in other scenarios make the program
Unstable. [5][4]
Some of the risks the software might incur are of the types:
· Technologies that are new and unproven.
· Requirements for Users and Functionality.
· System and Application Architecture Risks
· Performance Risks
· Organizational Risks
Technologies that are new and unproven:
Most of the modern software incorporates new practices and technology, previously untested by the organization.
Ever changing tools and variations in standard protocols which after being modified result in buggy behavior and might cause instabilities in various system architectures. Software developers and ultimately the Software Managers should be wary of such practices and should test the integrity of the same by means of Beta-testing.[5]

An alternative approach involving extensive testing is also suggested if the new untested technology is of crucial importance to its function.
Requirements for User and Functionality:
Software requirements capture all user needs. They usually change as time progresses and the process of requirement definition is a long complex process. Not to mention tedious.
Requirements are not set in stone and arise with new discoveries and underlying hardware changes. Integration and prototyping also propagate throughout the entirety of the program. [5]
In most cases, modifications to user requirements do not translate to functional requirements. User Interface design and other means of interaction in such cases will prove tricky but bear in mind that these major changes may result in the success or doom of the software development project.
System and Application Architecture Risks:
Taking the wrong approach when it comes to platform architecture can have serious consequences. It is crucial to the developers to have a sound idea of the system they are developing the application towards.
Sound design changes in UX and UI are to be also tailored keeping in mind OS targeted since they are the primary means of interaction by the User.
Any bugs resulting in the same will immediately be noticed and might cause...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here