Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Three Distinct Perspectives of Applied Ethics Value: 15% Due Date: 05-Aug-2018 Return Date: 27-Aug-2018 Length: XXXXXXXXXX Submission method options: Alternative submission method Task back to top...

1 answer below »
Three Distinct Perspectives of Applied Ethics
Value: 15%
Due Date: 05-Aug-2018
Return Date: 27-Aug-2018
Length:  XXXXXXXXXX
Submission method options: Alternative submission method
Task
ack to top
Proceed according to the following instructions.
· Identify a recent (within the last six (6) months) ethical dilemma or ethically questionable situation relating to ICT that you are familiar with. This situation can be either in the media (for example one you have sourced from a newspaper, or online through social media) or through your workplace.
· a. If using a workplace example, to maintain confidentiality, do not use real names.
· b. If you use a media article you must include the link to the media article in the references list of your assignment.
· Identify the key ethical issues contained in your chosen case and use the three distinct perspectives of applied ethics including professional, philosophical, sociological/descriptive ethics to analyse the ethical issues involved in the case. The word limit should be between XXXXXXXXXXwords. Note: Headings, citations, references and any appendices do not count towards your word limit, but quotations do. At the start of the assignment indicates in
ackets the word count of your assignment excluding those items mentioned above.
· Include a Reference list at the end of your work, in the co
ect APA referencing style, co
esponding to in-text citations. You must include at least THREE (3) quality academic references (one for each ethical perspective) from different sources. Please note that these references are in addition to those provided to you through this subject (for example, you still must reference, Tavani textbook, the Interact subject lecture notes etc BUT these references cannot be used as one of your three quality academic references from different sources). Only include references that have been cited in the body of your assignment and ones that support what you have presented in your assignment.
NOTE: Please use the template provided in the resources section of this subject site.
Rationale
ack to top
This assessment task will assess the following learning outcome/s:
· be able to identify ethical issues related to ICT.
· be able to assess the implications of ethical problems.
· be able to critically evaluate solutions to ethical problems.
· be able to argue consistently and rationally about the moral issues raised by the adoption and use of ICT.
Marking criteria and standards
ack to top
The following marking sheet will be used to assess students' submissions. Please check that you have met all the criteria before you submit your assignment
    Criteria 
    Standards
    
    High Distinction (HD)
    Distinction (DI)
    Credit (CR)
    Pass (PS)
    Fail (FL)
    Use professional, philosophical, and sociological/descriptive ethics perspectives to analyse the ethical issues involved in the case. 
(Value 70%)
 
    Comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.
    Mostly comprehensive understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through in-depth discussion and analysis of three most relevant ethical issues involved in your chosen case.
    Some understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.
    Basic understanding of the professional, philosophical, and sociological/descriptive ethics perspectives through some discussion and analysis of two relevant ethical issues involved in your chosen case.
    Major omissions in understanding of the professional, philosophical, and sociological/descriptive ethics perspectives and i
elevant ethical issues are identified and analysed.
     
Writing & structure
(Value 20%)
 
    Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation e
ors.
    Well-developed skills in expression & presentation of ideas.
Fluent writing style appropriate to assessment task/document type.
Grammar & spelling accurate.
    Good skills in expression & clear presentation of ideas.
Mostly fluent writing style appropriate to assessment task/document type.
Grammar & spelling contains a few minor e
ors.
    The text contains frequent e
ors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort.
    Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.
Grammar & spelling contains many e
ors.
    Referencing
(Value 10%)
    Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions.
    Very good referencing, including reference list and citations.
High quality references.
    Good referencing, including reference list and citations.
Good quality references.
    Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor e
ors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic integrity.
    Sub-standard (or no) referencing.
Poor quality (or no) references.
Answered Same Day Jul 29, 2020

Solution

Kuldeep answered on Aug 01 2020
130 Votes
Apple-Data Security
Apple-Data Security
SCHOOL OF COMPUTING AND MATHS, Charles Sturt University
Apple-Data Security
Assignment 1: Three Distinct Perspectives of Applied Ethics
Your Name
Student Numbe
Word Count:
I. Introduction
The case selected is related to the unlocking of the 5c security features. Earlier, there was a dispute between the Apple and FBI, and Apple declined to provide any form of assistance to the FBI. The FBI now achieves this goal without resorting to the organization. They access all the information in the RAM location. This has caused a big issue for Apple. This will be the big business condition of Apple (Agbatogun, &Lawunmi, 2011). FBI did not provide this process to Apple if FBI launched the process in the market; this would be a huge threat to Apple. The whole stock market in the industry will moreover be affected as customers lose the trust of the industry. This has also become a major threat to the Apple industry. It affects the security features of several customers if the privacy and security of the data are affected and it will also affect the total revenue of the company and affect the industry's goodwill.
II. Professional Ethics Perspectives
Based on those who primarily view network ethics as a
anch or subdivision of the professional ethics, this area is understood as identifying furthermore analyzing the ethical responsibilities of computer and IT professionals. From the perspective of network ethics issues, these issues are related to the role of compute
IT professionals in designing, developing, and maintaining computer hardware and software systems. Those who view network ethics as a
anch of professional ethics may use analogies in other areas of expertise, such as medicine and law. They will point out that in medical ethics and legal ethics, the main focus of the analysis is to influence the individual's moral responsibility as a member of these professions. By analogy, they will continue to argue that the same reason should apply to the field of network ethics, that is, the main focus of network ethics, and perhaps even the focus of exclusivity should be on the moral responsibility of compute
IT professionals. This will have a negative impact on users. The company is going to lose the trust of its customers (Bologn    a, 2014). This will have an impact on the turnover. They think the iPhone 5C is not safe because nobody can crack data through their mobile phone. Apple has not given any signals to prevent Apple security features and Apple is looking for ways to find the process and they are experimenting with many other features to protect their mobile data. It entered into a secret job in the iPhone's RAM (this is a virus). It has been found (according to the data) that the foreign te
orist organization is affected by an attacker. They also found out about their data related to another te
orist organization (Zhu, (2018).
There is no doubt that security of the iPhone has been affected, but it is also harmful to leave the te
orists freely on the street. Te
orists can do several attacks as well as Apple give more freedom to te
orists to give birth to another new te
orism. When the FBI requests to Apple for help, they have the responsibility to assist the FBI team. In case they do not want or need to create iPhone-based software, they should be able to unlock certain phones so that the FBI can easily solve their cases. Apple is impressed. The FBI
oke the lock function of the iPhone 5C, which is a big issue for the firm. If this exceptional feature has been exposed to the market, people can access it for illegal purposes and anyone can handle the data by hacking the password for the phone...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here