Assessment Details and Submission Guidelines
Trimeste
T1, 2022
Unit Code
BN201
Unit Title
Professional Issues of Information Technology
Assessment
Autho
Mr. Min P Gurung
Assessment
Type
Assignment 2 - Group Report
Assessment
Title
Ethical issues arising from use of ICT technologies
Purpose of
the assessment (with ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students should be able to
demonstrate their achievements in them.
a. Explain management concepts applied in ICT organisations and society;
c. Interpret ethical, professional standards and codes of practice to ICT systems;
d. Understand the importance of team work, collaboration and life-long learning in the workplace.
Weight
25%
Total Marks
70
Word range
XXXXXXXXXX
Due Date
Week-11 Sunday, 01/06/2022 at 23:59 PM.
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a completed Assignment
Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.
Extension
If an extension of time to submit work is required, a Special Consideration Application must be submitted online to AMS follow the link below you may require to login. You must submit this application three working days prior to the due date of the assignment.
https:
online.mit.edu.au/ams/PublicDocs/Student/MIT_Special_Consideration_Application.pdf
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: https:
www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/AcademicIntegrityPolicyAndProcedure For further information, please refer to the Academic Integrity Section in your Unit Description.
Prepared by: Mr. Min P Gurung Moderated by: Dr. Sadia Aziz May, 2022
Prepared by: Mr. Min P Gurung Moderated by: Dr. Sadia Aziz May, 2022
Assignment Description
Students should form a group of three (3) students from the same laboratory class. You must not change the group membership unless approved by your tutor. Tutor will then allocate one of the topics listed in Table 1 to each group.
All students must collaborate in this group assignment and contribute equally. Group leader should report their progress on a weekly basis to relevant tutor. Every student must participate in peer assessment on the Spark- Plus system.
Table 1: List of topics for Assignment-2.
Topic 1: Cybersquatting: Is It Entrepreneurship or Intellectual Theft?
“Just before the 2000 New York senatorial campaign, Chris Hayden paid $70 each for the exclusive
2-year rights to the following Internet addresses: www.hillary2000.com, www.hillaryclinton2000.com, and www.clinton2000.com. A few weeks later, Mrs. Hillary Clinton, the then US first lady, declared her candidacy for the state of New York senatorial race. The Clinton campaign team wanted her presence on the web, but they could not use any of the three names, though they rightly belonged to Mrs. Clinton. Deciding not to challenge Mr. Hayden in the middle of an election campaign, the team opted to buy the rights for www.hillary2000.com from Mr. Hayden. However, Mr. Hayden decided to engage a
oker to demand $15,000 for the use of the name”.
“Cybersquatting, as the practice of gra
ing somebody’s name and registering it with an Internet registration company in anticipation of reaping huge rewards, is becoming widespread”. [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on Intellectual Property Right (IPR) raised in the case.
Topic 2: Electronic Surveillance and the Bodyguard
“Jon Kiggwe is a young aggressive entrepreneur, with a
ight future. With several businesses doing well and a few start-ups with promising financial status, Jon is on his way to making a million dollars before his 25th birthday. Jon’s business meetings take him into tough neighborhoods. So, for him to feel secure, Jon uses a team of professional security bodyguards to shadow him almost 24 hours a day”.
“In his big 10 million dollar home, Jon receives a stream of guests, including both business associates and friends. His bodyguards, besides keeping an eye on him, also see to the orderly a
ival and departure of the guests. Because of this, the bodyguards keep a permanent office and sleeping quarters at Jon’s mansion”.
“Without informing them, Jon installed video recording and listening gadgets in the guards’ office and sleeping quarters to record their every conversation and movement. He feels safe that way!” [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on IT surveillance and social implications raised in this case.
BN201
Professional Issues of Information Technology
Page 4 of 5
2Prepared by: Mr. Min P Gurung
Moderated by: Dr. Sadia Aziz
May, 2022
Topic 3: Who Will Pay the Price for Flawed Software?
“Peter Efon works as a programmer for a major software company. The company, Cybersoft, is launching itself to be a major Internet-based platform developer and it is soon to launch a web initiative. Peter is involved in the development of a crucial component of the initiative. The company has trust in Peter for he has worked for it since he left college 15 years ago. Since his a
ival at the company, Peter has pioneered a number of major software development projects. Peter has followed, and is very much aware of, the losses suffered by other businesses due to defective software. He even knows that in 2000, US companies suffered a whopping $100 billion loss due to bad software. He and his company, Cybersoft, are determined to target quality as the major focus of their new web initiative. Peter dreams of the success of the web initiative and the recognition it might
ing both to his company and him. However, a few days before the launch of the much-awaited initiative, as Peter makes his final quality checks, he discovers a flaw in the core component of the initiative whose magnitude he could not determine. To do so would mean a few weeks delay at best, a major blow to the company’s efforts. The company had mounted an advertising blitz on all major media outlets. Even a few weeks delay would cause major financial losses and the public’s loss of confidence in the right company. This must never happen. Peter decides to see to it”. [Source: Kizza J.M. History of Computing. In: Ethical and Social Issues in the Information Age, 2010, Texts in Computer Science. Springer, London]
Investigate and report on the role of risk management in software systems design and construction raised in his case.
Marking criteria:
You must use the following aspects as headings for your report.
Aspects
Description of the section
Marks
1. Introduction to the case
scenario
Introduce the ethical issue/s that arise in the case/scenario.
10
2. Analysis of ethical issues using ethical theories framework
Conduct an ethical analysis using ethical theories framework (consequence, duty, contract and character based theories)
Relevance of each theory – 5 Marks*3 = 15 Marks.
Use ethical principles from these theories, apply it to the scenario, and conduct your analysis.
Ethical principal applied – 5*3 = 15 Marks
Arguments need to be stated clearly and backed up using peer-reviewed sources. (5 Marks)
35
3. Discussion your findings
Discuss your findings here in detail refe
ing to ethical frameworks (see above).
10
4. Conclusion
Write a nice concluding remarks of overall report. No new information should be included in the conclusion
10
5. Referencing
IEEE referencing style
5
Total
70
Marking Ru
ic:
Grade
Mark
HD
80-100%
DI
70-79%
CR
60-69%
P
50-59%
Fail
50%
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Introduction to
the case/scenario
10
Information is
Excellent. Case is explained very succinctly
Case
information is clearly presented
Case
explanation is presented and good attempt at it
Case
explanation is satisfactory
Case is not clear.
Hard to follow
peer reviewed academic sources
explained using academic sources
are explained. Academic sources are not integrated fully
need to be justified clearly
Ethical values are not discussed
Analysis of
ethical issues using ethical theories framework
35
Logic is clear and
easy to follow with strong arguments. Excellent integration of ethical theories in the context of the case
Very good
discussion of ethical theories in the context of the case supported through academic argument
Good attempt
at explaining the ethical theories in the context of the case using
some academic
sources
Ethical theories
are integrated within the case to some extent. However requires more extensive work
No evidence of
ethical theories and their relevance to
the case
Discussion of
your findings
10
Excellent
discussion of findings in the case study. Clear justification of
their final decision
in the case using arguments
Very good
discussion of findings in the case
study. Final decision in the case explained
Good attempt
at discussion of findings in the case. Final decision is
listed but
equires more work
Made some
effort in discussing the case study findings. No clear evidence of justification of decision
Poor discussion
of findings. Lacks coherence and justification
Conclusion
10
Conclusion is
excellent offering insights in to the case and summary of report
Conclusion
is very good and
provides
insights in to case and summary of work
Conclusion
discusses the case and major findings
Conclusion
includes summary of work but requires more work
Conclusion is
not written very well and has new information
Referencing
5
Clear styles with
excellent source of references.
Clea
eferencing style
Generally good
eferencing style
Sometimes
clear referencing style
Lacks
consistency with many e
ors