SlideShare a Scribd company logo
1 of 15
Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr.
Imran Jokhio July, 2017
Assessment Details and Submission Guidelines
Unit Code MN501
Unit Title Network Management in Organisations
Term, Year Term‐2, 2017
Assessment
Type
Assignment‐1
Assessment Title Ethical issues for IT security personnel
Purpose of the
assessment
(with ULO
Mapping)
The purpose of this assignment is to develop skills in
research, critical analysis and
academic writing of high standard. In this assignment students
will:
Identify potential ethical and social issues related to IT adminis
tration ethics.
Discuss ethical and social issues pertaining to IT systems‐admin
istration.
Interpret professional codes of ethics developed by various indu
stry bodies.
Discuss ethical behaviour in accordance with professional codes
.
ethical solutions to ensure that the society benefits.
Students must be able to generate ideas at abstract levels
and support their
arguments with strong reasoning. Students must strengthen criti
cal thinking skills by
answering the assignment.
Weight 10%
Total Marks 100
Word limit 500 ‐ 1000
Due Date Week‐7 Thursday 5.00 PM.
Submission
Guidelines
All work must be submitted on Moodle by the due date along wi
th a completed
Assignment Cover Page.
The assignment must be in MS Word format, 1.5 spacing, 11‐pt
Calibri (Body) font
and 2 cm margins on all four sides of your page with appropriat
e section headings.
Reference sources must be cited in the text of the report, and lis
ted appropriately
at the end in a reference list using IEEE referencing style.
Extension an extension of time to submit work is
required, a Special Consideration
Application must be submitted directly to the School's Administ
ration Officer, in
Melbourne on Level 6 or in Sydney on Level 7. You must subm
it this application
three working days prior to the due date of the assignment. Furt
her information is
available at:
http://www.mit.edu.au/about‐mit/institute‐publications/policies‐
procedures‐and‐
guidelines/specialconsiderationdeferment
Academic
Misconduct
Misconduct
is a serious offence. Depending on the seriousness of the
case, penalties can vary from a written warning or zero marks to
exclusion from
the course or rescinding the degree. Students should make
themselves familiar
with the full policy and procedure available
at:http://www.mit.edu.au/about‐
mit/institute‐publications/policies‐procedures‐and‐guidelines/Pl
agiarism‐
Academic‐Misconduct‐Policy‐Procedure.For further
information, please refer to
the Academic Integrity Section in your Unit Description.
MN501 Network Management in Organisations Page 2 of 4
Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr.
Imran Jokhio July, 2017
Assignment Description
Debra Shinder writes, “In fact, many IT pros don't even realize t
hat their jobs involve ethical issues. Yet we
make decisions on a daily basis that raise ethical questions [1].”
Debra poses the following ethical scenarios.
0)
IT and security consultants who do work for multiple companies
have even more ethical issues to
deal with. If you learn things about one of your clients that mig
ht affect your other client(s), where
does your loyalty lie? Should you use the information
gained from Client‐A for the benefit of the
other client, Client‐B?
1)
Then there are money issues. The proliferation of network attac
ks, hacks, viruses and other threats
to their IT infrastructures have caused many companies to "be a
fraid, be very afraid." As a security
consultant, it may be very easy to play on that fear to convince
companies to spend far more money
than they really need to. Is it wrong for you to charge hundreds
or even thousands of dollars per
hour for your services, or is it a case of "whatever the market wi
ll bear?"
2)
Is it wrong for you to mark up the equipment and software that
you get for the customer when you
pass the cost through? What about kickbacks from equipment m
anufacturers? Is it wrong to accept
"commissions" from them for persuading your clients to
go with their products? Or what if the
connection is more subtle? Is
it wrong to steer your clients toward the products of companies
in
which you hold stock?
3)
Another ethical issue involves promising more than you can deli
ver, or manipulating data to obtain
higher fees. You can install technologies and configure
settings to make a client's network more
secure, but you can never make it completely secure. Is it wrong
to talk a client into replacing their
current firewalls with those of a different manufacturer, or swit
ching to an open source operating
system – which changes, coincidentally, will result in
many more billable hours for you – on the
premise that this is the answer to their security problems?
4) What if a client asks you to save money by cutting
out some of the security measures that you
recommended, yet your analysis of the client's security needs sh
ows that sensitive information will
be at risk if you do so? You try to explain this to the client, but
he/she is adamant. Should you go
ahead and configure the network in a less secure manner? Shoul
d you "eat" the cost and install the
extra security measures at no cost to the client? Should you refu
se to do the job?
Investigate and reflect upon one of the above scenarios using Et
hical Guidelines published by organisations
such as: EA, ACS, ACM and IEEE.
Students with ID ending with 0 or 5, answer scenario number 0
Students with ID ending with 1 or 6, answer scenario number 1
Students with ID ending with 2 or 7, answer scenario number 2
Students with ID ending with 3 or 8, answer scenario number 3
Students with ID ending with 4 or 9, answer scenario number 4
[1]
D.Shinder, ‘Ethical Issues for IT security professionals’, 2005. [
Online]. Available
http://www.computerworld.com/article/2557944/security0/ethic
al‐issues‐for‐it‐security‐
professionals.html [Accessed 28‐July‐2017]
MN501 Network Management in Organisations Page 3 of 4
Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr.
Imran Jokhio July, 2017
Marking criteria:
You must use the following aspects as headings for your answer
.
Marks are allocated as follows:
Aspects Description of the section Marks
Introduction Introduce the ethical issues in 3‐5 sentences 10
Identification Identify at least 2 important ethical issues 20
Analyse Analyse the above identified issues 20
Evaluate/justification
Evaluate the issues and write justification of your evaluation
20
Conclusion Write clear conclusion in 2‐3 sentences 20
Reference style Follow APA or IEEE reference style 10
Total 100
MN501 Network Management in Organisations Page 4 of 4
Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr.
Imran Jokhio July, 2017
Marking Rubric for Assignment‐1:Total Marks 50
Grade
Mark
HD
80‐100%
DI
70‐79%
CR
60‐69%
P
50‐59%
Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
relevant and
soundly
analysed.
Generally
relevant and
analysed.
Some relevance
and briefly
presented.
This is not
relevant to the
assignment
topic.
Identification
Demonstrated
excellent ability to
think critically and
sourced reference
material
appropriately
Demonstrat
ed excellent
ability to
think
critically but
did not
source
reference
material
appropriatel
y
Demonstrated
ability to think
critically and
sourced
reference
material
appropriately
Demonstrated
ability to think
critically and did
not source
reference
material
appropriately
Did not
demonstrate
ability to think
critically and
did not source
reference
material
appropriately
Analyse
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Evaluate/justific
ation
Excellent use of
creditable sources.
Accurate
referencing.
Obvious that
outstanding effort
made
Extremely
good effort
Good effort
made but not
outstanding
Made some
effort. For
example, Web
searches only
Very little
attempt to
reference. Lazy
effort with
inaccuracies
Conclusion
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style
Clear styles with
excellent source of
references.
Clear
referencing
style
Generally good
referencing
style
Sometimes
clear
referencing
style
Lacks
consistency
with many
errors
Unhealthy Lunches
Drive-In Don’s fast food restaurant sells the most delicious
burgers in town at the most affordable price. Elementary and
high schools in the vicinity have contracted with the restaurant
to serve burgers during lunch hour. However, the county health
department’s one-year study shows that children from these
schools have the highest cholesterol, are the most obese, and are
the least active.
George and Mary’s son, Randall, 12, attends one of the schools
where Drive-In Don’s foods are served. He suffers from extreme
obesity and high cholesterol and runs the risk of diabetes.
George and Mary have sued Drive-In Don’s and the school,
alleging that Drive-In Don’s is engaging in illegal deceptive
advertising of its foods and is not truthful to customers. Further,
the lawsuit states that the restaurant purposely fails to provide
consumers details of the ingredients of its food products.
Research consumer protection laws and regulations, using your
textbook, the online library resources, and the Internet. Based
on the facts of the case and research, write an analytical paper
(approximately 4-5 pages). In the paper, respond to the
following questions:
· Do George and Mary have a case? What are their strongest
legal arguments? Explain.
· What defense(s), if any, do the school and the restaurant have?
Explain.
· Can the government agencies, such as the Federal Trade
Commission (FTC) help the plaintiffs in any way? Explain.
Write a 4--page paper in Word format. Apply APA standards for
writing style to your work.
By Sunday, August 27, 2017
Assignment 2 Grading Criteria
Maximum Points
Evaluated and explained the legal and ethical aspects of the
case.
35
Determined and explained the role administrative agencies may
play in this case.
35
Applied the legal principles to the facts to describe potential
outcomes
15
Supported statements with reasons and research.
10
Applied APA standards for editorial style, expression of ideas,
and format of text, citations, and references.
5
Total:
100

More Related Content

Similar to Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx

Exam Dumps.pdf
Exam Dumps.pdfExam Dumps.pdf
Exam Dumps.pdfwctp79ea
 
Exam Dumps
Exam DumpsExam Dumps
Exam Dumpsd01czqwk
 
Assessment Information .docx
Assessment Information                                        .docxAssessment Information                                        .docx
Assessment Information .docxdavezstarr61655
 
Syllabus Access Control, Authentication, and Public Key Infrast.docx
Syllabus Access Control, Authentication, and Public Key Infrast.docxSyllabus Access Control, Authentication, and Public Key Infrast.docx
Syllabus Access Control, Authentication, and Public Key Infrast.docxmabelf3
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxnettletondevon
 
Final Research Case AnalysisTopic Implementing Cybersecurity .docx
Final Research Case AnalysisTopic Implementing Cybersecurity .docxFinal Research Case AnalysisTopic Implementing Cybersecurity .docx
Final Research Case AnalysisTopic Implementing Cybersecurity .docxtjane3
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxwoodruffeloisa
 
Topic Tech companies prepare for cyber-attacks using common cyber.docx
Topic Tech companies prepare for cyber-attacks using common cyber.docxTopic Tech companies prepare for cyber-attacks using common cyber.docx
Topic Tech companies prepare for cyber-attacks using common cyber.docxjuliennehar
 
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docx
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docxEthical Healthcare Scenarios WorksheetScenario 1 Medical codi.docx
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docxhumphrieskalyn
 
ITM310_001FiliasW16
ITM310_001FiliasW16ITM310_001FiliasW16
ITM310_001FiliasW16Peter Filias
 
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...Unauthorised Question and Answer Sharing.- Implications for Higher Education ...
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...Thomas Lancaster
 
GE6075 - Unit 2 ppt for final year students
GE6075 - Unit 2 ppt for final year studentsGE6075 - Unit 2 ppt for final year students
GE6075 - Unit 2 ppt for final year studentsJesudassI
 
Recruitment and Selection in Canada 7th Edition Catano Solutions Manual
Recruitment and Selection in Canada 7th Edition Catano Solutions ManualRecruitment and Selection in Canada 7th Edition Catano Solutions Manual
Recruitment and Selection in Canada 7th Edition Catano Solutions ManualLancere
 
Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Jeffrey Keefer
 
Sept 2022 Dennis Beatty Webinar.pptx
Sept 2022 Dennis Beatty Webinar.pptxSept 2022 Dennis Beatty Webinar.pptx
Sept 2022 Dennis Beatty Webinar.pptxCapitolTechU
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docxalinainglis
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 educationdeborahjudah
 
Apps for teaching and learning: An institutional approach
Apps for teaching and learning: An institutional approachApps for teaching and learning: An institutional approach
Apps for teaching and learning: An institutional approachJisc
 

Similar to Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx (20)

Exam Dumps.pdf
Exam Dumps.pdfExam Dumps.pdf
Exam Dumps.pdf
 
Exam Dumps
Exam DumpsExam Dumps
Exam Dumps
 
Assessment Information .docx
Assessment Information                                        .docxAssessment Information                                        .docx
Assessment Information .docx
 
Safety Leadership
Safety LeadershipSafety Leadership
Safety Leadership
 
Syllabus Access Control, Authentication, and Public Key Infrast.docx
Syllabus Access Control, Authentication, and Public Key Infrast.docxSyllabus Access Control, Authentication, and Public Key Infrast.docx
Syllabus Access Control, Authentication, and Public Key Infrast.docx
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
 
Final Research Case AnalysisTopic Implementing Cybersecurity .docx
Final Research Case AnalysisTopic Implementing Cybersecurity .docxFinal Research Case AnalysisTopic Implementing Cybersecurity .docx
Final Research Case AnalysisTopic Implementing Cybersecurity .docx
 
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docxPROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
PROJECT DESIGNWORKSHEETpage 1Name of Project Engage-Explore.docx
 
Topic Tech companies prepare for cyber-attacks using common cyber.docx
Topic Tech companies prepare for cyber-attacks using common cyber.docxTopic Tech companies prepare for cyber-attacks using common cyber.docx
Topic Tech companies prepare for cyber-attacks using common cyber.docx
 
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docx
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docxEthical Healthcare Scenarios WorksheetScenario 1 Medical codi.docx
Ethical Healthcare Scenarios WorksheetScenario 1 Medical codi.docx
 
ITM310_001FiliasW16
ITM310_001FiliasW16ITM310_001FiliasW16
ITM310_001FiliasW16
 
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...Unauthorised Question and Answer Sharing.- Implications for Higher Education ...
Unauthorised Question and Answer Sharing.- Implications for Higher Education ...
 
GE6075 - Unit 2 ppt for final year students
GE6075 - Unit 2 ppt for final year studentsGE6075 - Unit 2 ppt for final year students
GE6075 - Unit 2 ppt for final year students
 
Recruitment and Selection in Canada 7th Edition Catano Solutions Manual
Recruitment and Selection in Canada 7th Edition Catano Solutions ManualRecruitment and Selection in Canada 7th Edition Catano Solutions Manual
Recruitment and Selection in Canada 7th Edition Catano Solutions Manual
 
Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15Research Process and Methodology FA10 class 1v15
Research Process and Methodology FA10 class 1v15
 
Sept 2022 Dennis Beatty Webinar.pptx
Sept 2022 Dennis Beatty Webinar.pptxSept 2022 Dennis Beatty Webinar.pptx
Sept 2022 Dennis Beatty Webinar.pptx
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx· General Design Analysis - Information is collected from library.docx
· General Design Analysis - Information is collected from library.docx
 
E safety in post-16 education
E safety in post-16 educationE safety in post-16 education
E safety in post-16 education
 
Apps for teaching and learning: An institutional approach
Apps for teaching and learning: An institutional approachApps for teaching and learning: An institutional approach
Apps for teaching and learning: An institutional approach
 

More from harrisonhoward80223

© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx
© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx
© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docxharrisonhoward80223
 
§ 6.01 IntroductionBackground checks are an important component .docx
§ 6.01 IntroductionBackground checks are an important component .docx§ 6.01 IntroductionBackground checks are an important component .docx
§ 6.01 IntroductionBackground checks are an important component .docxharrisonhoward80223
 
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docxharrisonhoward80223
 
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docxharrisonhoward80223
 
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docxharrisonhoward80223
 
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docxharrisonhoward80223
 
© 2013 Laureate Education, Inc. 1 NURS 6441 Indivi.docx
© 2013 Laureate Education, Inc.   1 NURS 6441 Indivi.docx© 2013 Laureate Education, Inc.   1 NURS 6441 Indivi.docx
© 2013 Laureate Education, Inc. 1 NURS 6441 Indivi.docxharrisonhoward80223
 
© 2013 Laureate Education, Inc. 1 NURS 6441 Work .docx
© 2013 Laureate Education, Inc.   1  NURS 6441 Work .docx© 2013 Laureate Education, Inc.   1  NURS 6441 Work .docx
© 2013 Laureate Education, Inc. 1 NURS 6441 Work .docxharrisonhoward80223
 
© 2013 Laureate Education, Inc. 1 Comprehensive Write-u.docx
© 2013 Laureate Education, Inc.    1 Comprehensive Write-u.docx© 2013 Laureate Education, Inc.    1 Comprehensive Write-u.docx
© 2013 Laureate Education, Inc. 1 Comprehensive Write-u.docxharrisonhoward80223
 
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx
© 2011  The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx© 2011  The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.Mc.docxharrisonhoward80223
 
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docxharrisonhoward80223
 
© 2010 by The Johns Hopkins University PressConflicting Va.docx
© 2010 by The Johns Hopkins University PressConflicting Va.docx© 2010 by The Johns Hopkins University PressConflicting Va.docx
© 2010 by The Johns Hopkins University PressConflicting Va.docxharrisonhoward80223
 
© 2009 • Journal of Sport Administration & Supervision • Vol. .docx
© 2009 • Journal of Sport Administration & Supervision • Vol. .docx© 2009 • Journal of Sport Administration & Supervision • Vol. .docx
© 2009 • Journal of Sport Administration & Supervision • Vol. .docxharrisonhoward80223
 
© 2009 John Wiley and Sons AustraliaDistribution (place).docx
© 2009 John Wiley and Sons AustraliaDistribution (place).docx© 2009 John Wiley and Sons AustraliaDistribution (place).docx
© 2009 John Wiley and Sons AustraliaDistribution (place).docxharrisonhoward80223
 
© 2003 Applied Scholastics International. All Rights Reser.docx
© 2003 Applied Scholastics International. All Rights Reser.docx© 2003 Applied Scholastics International. All Rights Reser.docx
© 2003 Applied Scholastics International. All Rights Reser.docxharrisonhoward80223
 
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docxharrisonhoward80223
 
© 2002, The Ripple Effect 1 permission granted to use for.docx
© 2002, The Ripple Effect 1      permission granted to use for.docx© 2002, The Ripple Effect 1      permission granted to use for.docx
© 2002, The Ripple Effect 1 permission granted to use for.docxharrisonhoward80223
 
© 2005 Society for the Study of Addiction doi10.1111j.1360-.docx
© 2005 Society for the Study of  Addiction doi10.1111j.1360-.docx© 2005 Society for the Study of  Addiction doi10.1111j.1360-.docx
© 2005 Society for the Study of Addiction doi10.1111j.1360-.docxharrisonhoward80223
 
¡A Presentar en Español!Prepare To prepare for this activit.docx
¡A Presentar en Español!Prepare To prepare for this activit.docx¡A Presentar en Español!Prepare To prepare for this activit.docx
¡A Presentar en Español!Prepare To prepare for this activit.docxharrisonhoward80223
 
You are the Human Resource Director for a 500-.docx
You are the Human Resource Director for a 500-.docxYou are the Human Resource Director for a 500-.docx
You are the Human Resource Director for a 500-.docxharrisonhoward80223
 

More from harrisonhoward80223 (20)

© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx
© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx
© 2006 Thomson-Wadsworth© 2006 Thomson-Wadsworth.docx
 
§ 6.01 IntroductionBackground checks are an important component .docx
§ 6.01 IntroductionBackground checks are an important component .docx§ 6.01 IntroductionBackground checks are an important component .docx
§ 6.01 IntroductionBackground checks are an important component .docx
 
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx
©  Dr.  Curtis  Odom.  All  Rights  Reserved.  [.docx
 
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. .docx
 
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx
© 2013 Laureate Education, Inc. 1 Adolescence” Program .docx
 
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx
© 2013 Laureate Education, Inc. 1 Young Adulthood” Prog.docx
 
© 2013 Laureate Education, Inc. 1 NURS 6441 Indivi.docx
© 2013 Laureate Education, Inc.   1 NURS 6441 Indivi.docx© 2013 Laureate Education, Inc.   1 NURS 6441 Indivi.docx
© 2013 Laureate Education, Inc. 1 NURS 6441 Indivi.docx
 
© 2013 Laureate Education, Inc. 1 NURS 6441 Work .docx
© 2013 Laureate Education, Inc.   1  NURS 6441 Work .docx© 2013 Laureate Education, Inc.   1  NURS 6441 Work .docx
© 2013 Laureate Education, Inc. 1 NURS 6441 Work .docx
 
© 2013 Laureate Education, Inc. 1 Comprehensive Write-u.docx
© 2013 Laureate Education, Inc.    1 Comprehensive Write-u.docx© 2013 Laureate Education, Inc.    1 Comprehensive Write-u.docx
© 2013 Laureate Education, Inc. 1 Comprehensive Write-u.docx
 
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx
© 2011  The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx© 2011  The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved.Mc.docx
 
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx
© 2011 The McGraw-Hill Companies, Inc. All rights reserved..docx
 
© 2010 by The Johns Hopkins University PressConflicting Va.docx
© 2010 by The Johns Hopkins University PressConflicting Va.docx© 2010 by The Johns Hopkins University PressConflicting Va.docx
© 2010 by The Johns Hopkins University PressConflicting Va.docx
 
© 2009 • Journal of Sport Administration & Supervision • Vol. .docx
© 2009 • Journal of Sport Administration & Supervision • Vol. .docx© 2009 • Journal of Sport Administration & Supervision • Vol. .docx
© 2009 • Journal of Sport Administration & Supervision • Vol. .docx
 
© 2009 John Wiley and Sons AustraliaDistribution (place).docx
© 2009 John Wiley and Sons AustraliaDistribution (place).docx© 2009 John Wiley and Sons AustraliaDistribution (place).docx
© 2009 John Wiley and Sons AustraliaDistribution (place).docx
 
© 2003 Applied Scholastics International. All Rights Reser.docx
© 2003 Applied Scholastics International. All Rights Reser.docx© 2003 Applied Scholastics International. All Rights Reser.docx
© 2003 Applied Scholastics International. All Rights Reser.docx
 
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx
© 2005 Chris Thompson and Katarina Weslien PAJ 82 (2006), pp. .docx
 
© 2002, The Ripple Effect 1 permission granted to use for.docx
© 2002, The Ripple Effect 1      permission granted to use for.docx© 2002, The Ripple Effect 1      permission granted to use for.docx
© 2002, The Ripple Effect 1 permission granted to use for.docx
 
© 2005 Society for the Study of Addiction doi10.1111j.1360-.docx
© 2005 Society for the Study of  Addiction doi10.1111j.1360-.docx© 2005 Society for the Study of  Addiction doi10.1111j.1360-.docx
© 2005 Society for the Study of Addiction doi10.1111j.1360-.docx
 
¡A Presentar en Español!Prepare To prepare for this activit.docx
¡A Presentar en Español!Prepare To prepare for this activit.docx¡A Presentar en Español!Prepare To prepare for this activit.docx
¡A Presentar en Español!Prepare To prepare for this activit.docx
 
You are the Human Resource Director for a 500-.docx
You are the Human Resource Director for a 500-.docxYou are the Human Resource Director for a 500-.docx
You are the Human Resource Director for a 500-.docx
 

Recently uploaded

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 

Prepared by Assoc. Prof. Nalin Sharda Moderated by Dr. .docx

  • 1. Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr. Imran Jokhio July, 2017 Assessment Details and Submission Guidelines Unit Code MN501 Unit Title Network Management in Organisations Term, Year Term‐2, 2017 Assessment Type Assignment‐1 Assessment Title Ethical issues for IT security personnel Purpose of the assessment (with ULO Mapping) The purpose of this assignment is to develop skills in research, critical analysis and academic writing of high standard. In this assignment students will:
  • 2. Identify potential ethical and social issues related to IT adminis tration ethics. Discuss ethical and social issues pertaining to IT systems‐admin istration. Interpret professional codes of ethics developed by various indu stry bodies. Discuss ethical behaviour in accordance with professional codes . ethical solutions to ensure that the society benefits. Students must be able to generate ideas at abstract levels and support their arguments with strong reasoning. Students must strengthen criti cal thinking skills by answering the assignment. Weight 10% Total Marks 100 Word limit 500 ‐ 1000 Due Date Week‐7 Thursday 5.00 PM. Submission Guidelines All work must be submitted on Moodle by the due date along wi th a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11‐pt
  • 3. Calibri (Body) font and 2 cm margins on all four sides of your page with appropriat e section headings. Reference sources must be cited in the text of the report, and lis ted appropriately at the end in a reference list using IEEE referencing style. Extension an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administ ration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must subm it this application three working days prior to the due date of the assignment. Furt her information is available at: http://www.mit.edu.au/about‐mit/institute‐publications/policies‐ procedures‐and‐ guidelines/specialconsiderationdeferment Academic Misconduct Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:http://www.mit.edu.au/about‐ mit/institute‐publications/policies‐procedures‐and‐guidelines/Pl agiarism‐
  • 4. Academic‐Misconduct‐Policy‐Procedure.For further information, please refer to the Academic Integrity Section in your Unit Description. MN501 Network Management in Organisations Page 2 of 4 Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr. Imran Jokhio July, 2017 Assignment Description Debra Shinder writes, “In fact, many IT pros don't even realize t hat their jobs involve ethical issues. Yet we make decisions on a daily basis that raise ethical questions [1].” Debra poses the following ethical scenarios. 0) IT and security consultants who do work for multiple companies have even more ethical issues to deal with. If you learn things about one of your clients that mig ht affect your other client(s), where does your loyalty lie? Should you use the information gained from Client‐A for the benefit of the other client, Client‐B? 1) Then there are money issues. The proliferation of network attac ks, hacks, viruses and other threats to their IT infrastructures have caused many companies to "be a fraid, be very afraid." As a security
  • 5. consultant, it may be very easy to play on that fear to convince companies to spend far more money than they really need to. Is it wrong for you to charge hundreds or even thousands of dollars per hour for your services, or is it a case of "whatever the market wi ll bear?" 2) Is it wrong for you to mark up the equipment and software that you get for the customer when you pass the cost through? What about kickbacks from equipment m anufacturers? Is it wrong to accept "commissions" from them for persuading your clients to go with their products? Or what if the connection is more subtle? Is it wrong to steer your clients toward the products of companies in which you hold stock? 3) Another ethical issue involves promising more than you can deli ver, or manipulating data to obtain higher fees. You can install technologies and configure settings to make a client's network more secure, but you can never make it completely secure. Is it wrong to talk a client into replacing their current firewalls with those of a different manufacturer, or swit ching to an open source operating system – which changes, coincidentally, will result in many more billable hours for you – on the premise that this is the answer to their security problems? 4) What if a client asks you to save money by cutting out some of the security measures that you recommended, yet your analysis of the client's security needs sh ows that sensitive information will
  • 6. be at risk if you do so? You try to explain this to the client, but he/she is adamant. Should you go ahead and configure the network in a less secure manner? Shoul d you "eat" the cost and install the extra security measures at no cost to the client? Should you refu se to do the job? Investigate and reflect upon one of the above scenarios using Et hical Guidelines published by organisations such as: EA, ACS, ACM and IEEE. Students with ID ending with 0 or 5, answer scenario number 0 Students with ID ending with 1 or 6, answer scenario number 1 Students with ID ending with 2 or 7, answer scenario number 2 Students with ID ending with 3 or 8, answer scenario number 3 Students with ID ending with 4 or 9, answer scenario number 4 [1] D.Shinder, ‘Ethical Issues for IT security professionals’, 2005. [ Online]. Available http://www.computerworld.com/article/2557944/security0/ethic al‐issues‐for‐it‐security‐ professionals.html [Accessed 28‐July‐2017] MN501 Network Management in Organisations Page 3 of 4 Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr. Imran Jokhio July, 2017
  • 7. Marking criteria: You must use the following aspects as headings for your answer . Marks are allocated as follows: Aspects Description of the section Marks Introduction Introduce the ethical issues in 3‐5 sentences 10 Identification Identify at least 2 important ethical issues 20 Analyse Analyse the above identified issues 20 Evaluate/justification Evaluate the issues and write justification of your evaluation 20 Conclusion Write clear conclusion in 2‐3 sentences 20 Reference style Follow APA or IEEE reference style 10 Total 100 MN501 Network Management in Organisations Page 4 of 4 Prepared by: Assoc. Prof. Nalin Sharda Moderated by: Dr.
  • 8. Imran Jokhio July, 2017 Marking Rubric for Assignment‐1:Total Marks 50 Grade Mark HD 80‐100% DI 70‐79% CR 60‐69% P 50‐59% Fail <50% Excellent Very Good Good Satisfactory Unsatisfactory Introduction All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated
  • 9. Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Identification Demonstrated excellent ability to think critically and sourced reference material appropriately Demonstrat ed excellent ability to think critically but did not
  • 10. source reference material appropriatel y Demonstrated ability to think critically and sourced reference material appropriately Demonstrated ability to think critically and did not source reference material appropriately Did not demonstrate ability to think critically and did not source reference material appropriately Analyse Logic is clear and
  • 11. easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Evaluate/justific ation Excellent use of creditable sources. Accurate referencing. Obvious that outstanding effort made Extremely good effort
  • 12. Good effort made but not outstanding Made some effort. For example, Web searches only Very little attempt to reference. Lazy effort with inaccuracies Conclusion Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction
  • 13. Argument is confused and disjointed Reference style Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors Unhealthy Lunches Drive-In Don’s fast food restaurant sells the most delicious
  • 14. burgers in town at the most affordable price. Elementary and high schools in the vicinity have contracted with the restaurant to serve burgers during lunch hour. However, the county health department’s one-year study shows that children from these schools have the highest cholesterol, are the most obese, and are the least active. George and Mary’s son, Randall, 12, attends one of the schools where Drive-In Don’s foods are served. He suffers from extreme obesity and high cholesterol and runs the risk of diabetes. George and Mary have sued Drive-In Don’s and the school, alleging that Drive-In Don’s is engaging in illegal deceptive advertising of its foods and is not truthful to customers. Further, the lawsuit states that the restaurant purposely fails to provide consumers details of the ingredients of its food products. Research consumer protection laws and regulations, using your textbook, the online library resources, and the Internet. Based on the facts of the case and research, write an analytical paper (approximately 4-5 pages). In the paper, respond to the following questions: · Do George and Mary have a case? What are their strongest legal arguments? Explain. · What defense(s), if any, do the school and the restaurant have? Explain. · Can the government agencies, such as the Federal Trade Commission (FTC) help the plaintiffs in any way? Explain. Write a 4--page paper in Word format. Apply APA standards for writing style to your work. By Sunday, August 27, 2017 Assignment 2 Grading Criteria Maximum Points Evaluated and explained the legal and ethical aspects of the case. 35 Determined and explained the role administrative agencies may play in this case.
  • 15. 35 Applied the legal principles to the facts to describe potential outcomes 15 Supported statements with reasons and research. 10 Applied APA standards for editorial style, expression of ideas, and format of text, citations, and references. 5 Total: 100