SlideShare a Scribd company logo
1 of 8
This assignment is an opportunity to explore and apply a
decision making framework to an IT-related ethical issue.
A framework provides a methodical and systematic approach for
decision making
.
UMGC
Module 2 - Methods of Ethical Analysis (see LEO Content –
Readings for week 2)
describes three structured frameworks that may be used for
ethical analysis, namely
Reynolds Seven-Step Approach, Kidder’s Nine Steps, and
Spinello’s Seven-Step Process
.
There are several ways described in UMGC Module 2 to
systematically approach an ethical dilemma
, and while each of the frameworks described has its merits,
each will result in an ethical decision if straightforwardly,
objectively, and honestly applied.
In addition, consider the ethical theories described in
Module 1 – Introduction to Theoretical Ethical Frameworks (see
LEO Content – Readings for week 1)
which help decision makers find the right balance concerning
the acceptability of and justification for their actions.
A separate write-up of the ethical theory that supports your
decision is part of the following requirements
.
For this paper, the following five elements must be addressed:
Describe a current IT-related ethical issue
:
Since this is a paper exercise, not a real-time situation,
you may want to construct a brief scenario
where this issue comes into play, and thus causes an ethical
dilemma. The dilemma may affect you, your family, your job,
or your company; or it may be a matter of public policy or law
that affects the general populace.
See the list below for a list of suggested issues, which may be a
source of ethical dilemmas
.
Define a concise problem statement
that is
extracted
from the above description or scenario. It is best
if you define a specific problem caused by the dilemma, that
needs a specific ethical decision to be made, that will solve the
dilemma
. Be aware that if it is a matter of public policy or law, that it
may require a regulatory body or congressional approval to take
action to implement a solution.
Analyze your problem
using one of the structured decision-making frameworks chosen
from Module 2.
Make sure that you identify the decision-making framework
utilized. In addition, the steps in the decision-making
framework selected must be used as major headings in the
Analysis section.
Consider and state the impact of the decision that you made
on an individual, an organization, stakeholders, customers
suppliers, and the environment, as applicable!
State and discuss the applicable ethical theory
from Module 1
that supports your decision.
Concerning your paper:
Prepare a minimum 3- 5 page, double-spaced paper and submit
it to the LEO Assignments Module as an attached Microsoft
Word file.
Use headings for each topic criteria
Provide appropriate American Psychological Association (APA)
source citations for all sources you use
. In addition to critical thinking and analysis skills, your paper
should reflect appropriate grammar and spelling, good
organization, and proper business-writing style.
Include a Cover Page with your Name, the UMGC/Name of the
Class, and the Title of the Paper.
For example, Kidder’s approach has nine steps, which are:
Recognize that there is a moral issue.
Determine the actor (whose moral issue is it?).
Gather the relevant facts.
Test for right-versus-wrong issues.
Test for right-versus-right paradigms (what sort of dilemma is
this?).
Apply the resolution principles (ends-based, rule-based, or care-
based).
Investigate the "trilemma" options (look for common ground or
compromise).
Make the decision.
Revisit and reflect on the decision. (Kidder, 1995, p. 183-187)
Reminder:
Each of the steps for whatever framework that you select
must be a major heading
in the Analysis section of your paper.
Here are some suggested issues for you to consider, the
additional text is designed to help you flesh out the issue:
Privacy on the Web:
What is happening now in terms of privacy on the Web? Think
about recent abuses and improvements. Describe and evaluate
Web site policies, technical and privacy policy protections, and
current proposals for government regulations.
Personal Data Privacy Regulations in Other Countries:
Report on personal data privacy regulations, Web site privacy
policies, and governmental/law enforcement about access to
personal data in one or more countries; e.g., the European
Union. This is especially relevant as our global economic
community expands and we are more dependent on non-US
clients for e-business over the Internet.
Computer-Based Crimes
: Discuss the most prevalent types of computer crimes, such as
Phishing. Analyze why and how these can occur. Describe
protective measures that might assist in preventing or mitigating
these types of crimes.
Government Surveillance of the Internet
: The 9/11 attacks on the US in 2001 brought many new laws
and permits more government surveillance of the Internet. Is
this a good idea?
The Digital Divide:
Does it exist; what does it look like; and, what are the ethical
considerations and impact?
Privacy in the Workplace -
Monitoring Employee Web and E-Mail Use
: What are current opinions concerning the monitoring of
employee computer use. What policies are employers using?
Should this practice of monitoring, be authorized or not?
Medical Privacy
: Who owns your medical history? What is the state of current
legislation to protect your health information? Is it sufficient?
There are new incentives with federal stimulus financing for
health care organizations to develop and implement digital
health records.
Software Piracy
: How many of you have ever made an unauthorized copy of
software, downloaded software or music (free or for a fee), or
used copyrighted information without giving proper credit or
asking permission? Was this illegal or just wrong? How is this
being addressed?
9
.
Consumer Profiling
: With every purchase you make, every Web site you visit, your
preferences are being profiled. What is your opinion regarding
the legal authority of these organizations to collect and
aggregate this data?
Biometrics & Ethics:
Your fingerprint, retinal-vessel image, and DNA map can exist
entirely as a digital image in a computer, on a network, or in the
infosphere. What new and old ethical problems must we
address?
Social Networking:
What are some of the ethical issues surrounding using new
social networks? How are these now considered for business
use? What are business social communities? Are new/different
protections and security needed for these networks?
Gambling in Cyberspace:
Is it legal? Are there national regulations and/or licensing?
What are the oversight and enforcement requirements? Are there
international implications? What are the social and public
health issues?
Pornography in Cyberspace:
For example, the U.S. Supreme Court ruling protecting as free
speech computer-generated child pornography
Medicine and Psychiatry in Cyberspace:
Some considerations include: privacy issues; security; third-
party record-keeping; electronic medical records; access to
information, even by the patient (patient rights); access to
information by outsiders without patient knowledge; authority
to transfer and/or share information. Are there any policies
proposed by professional organizations?
Counterterrorism and Information Systems:
Your protection versus your rights
Open-source Software versus Closed-source Software:
Ethical ramifications and impact on intellectual property law
Creative Commons Licenses:
How do they work and what are the legal and ethical impacts
and concerns?
Universal ID card:
What is the general position of the U.S. government about
issuing each individual a unique ID card? Which individual U.S.
government agencies have already provided a unique ID card?
What steps have been taken to include individual ID
information electronically in passports? How is privacy and
security provided?
Video Games:
Does playing video games distract from everyday
responsibilities? Do video games correlate with real world
violence? Why do game creators continually increase the
violence of video games? What is video game addiction?
Cyberbullying:
What is cyberbullying and what can be done to stop it?
Net Neutrality:
What is the current position of the federal government and is it
fair to all?
This assignment is an opportunity to explore and apply a decisio.docx

More Related Content

Similar to This assignment is an opportunity to explore and apply a decisio.docx

Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxjuliennehar
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxbriancrawford30935
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organlauricesatu
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxrhetttrevannion
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxjakeomoore75037
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxchristalgrieg
 
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docx
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docxModule 2 Methods of Ethical AnalysisApplication of Ethical Theo.docx
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docxraju957290
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxloganta
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxgasciognecaren
 
InstructionsPaper B1 a matrix mapping of a key IT-related org.docx
InstructionsPaper B1 a matrix mapping of a key IT-related org.docxInstructionsPaper B1 a matrix mapping of a key IT-related org.docx
InstructionsPaper B1 a matrix mapping of a key IT-related org.docxJeniceStuckeyoo
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxhowardh5
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfManishKarki12
 
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docx
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docxPaper B1-Privacy-Related Matrix (12)This assignment gives you a.docx
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docxMARRY7
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxmattjtoni51554
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxjuliennehar
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docxhumphrieskalyn
 
Article 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docxArticle 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docxdavezstarr61655
 
You Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxYou Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxjeffevans62972
 

Similar to This assignment is an opportunity to explore and apply a decisio.docx (20)

Objective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docxObjective Apply decision making frameworks to IT-related ethica.docx
Objective Apply decision making frameworks to IT-related ethica.docx
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
This assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docxThis assignment provides an opportunity to analyze a key IT-rela.docx
This assignment provides an opportunity to analyze a key IT-rela.docx
 
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docx
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docxModule 2 Methods of Ethical AnalysisApplication of Ethical Theo.docx
Module 2 Methods of Ethical AnalysisApplication of Ethical Theo.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
This assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docxThis assignment gives you an opportunity to analyze a key IT-rel.docx
This assignment gives you an opportunity to analyze a key IT-rel.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related org.docx
InstructionsPaper B1 a matrix mapping of a key IT-related org.docxInstructionsPaper B1 a matrix mapping of a key IT-related org.docx
InstructionsPaper B1 a matrix mapping of a key IT-related org.docx
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docx
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docxPaper B1-Privacy-Related Matrix (12)This assignment gives you a.docx
Paper B1-Privacy-Related Matrix (12)This assignment gives you a.docx
 
Picture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docxPicture 1Picture 2InstructionsPaper B1 a matri.docx
Picture 1Picture 2InstructionsPaper B1 a matri.docx
 
Objective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docxObjective There are two high-level objectives in this project ass.docx
Objective There are two high-level objectives in this project ass.docx
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
Article 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docxArticle 1Question1.  What is that project Provide complete .docx
Article 1Question1.  What is that project Provide complete .docx
 
You Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docxYou Name Here1. What is Moore’s Law What does it apply to.docx
You Name Here1. What is Moore’s Law What does it apply to.docx
 
Review questions
Review questionsReview questions
Review questions
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
 

More from rhetttrevannion

Discuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxDiscuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxrhetttrevannion
 
Discuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxDiscuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxrhetttrevannion
 
Discuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxDiscuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxrhetttrevannion
 
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxDiscuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxrhetttrevannion
 
Discuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxDiscuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxrhetttrevannion
 
Discuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxDiscuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxrhetttrevannion
 
Discuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxDiscuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxrhetttrevannion
 
Discuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxDiscuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxrhetttrevannion
 
discuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxdiscuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxrhetttrevannion
 
Discuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxDiscuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxrhetttrevannion
 
Discuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxDiscuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxrhetttrevannion
 
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxDiscuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxrhetttrevannion
 
Discuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxDiscuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxrhetttrevannion
 
Discuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxDiscuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxrhetttrevannion
 
Discuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxDiscuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxrhetttrevannion
 
Discuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxDiscuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxrhetttrevannion
 
Discuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxDiscuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxrhetttrevannion
 
Discuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxDiscuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxrhetttrevannion
 
Discuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxDiscuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxrhetttrevannion
 
Discuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxDiscuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxrhetttrevannion
 

More from rhetttrevannion (20)

Discuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docxDiscuss three (3) ways that large organizations are increasingly eng.docx
Discuss three (3) ways that large organizations are increasingly eng.docx
 
Discuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docxDiscuss this week’s objectives with your team sharing related rese.docx
Discuss this week’s objectives with your team sharing related rese.docx
 
Discuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docxDiscuss theoretical considerations or assumptions relevant to yo.docx
Discuss theoretical considerations or assumptions relevant to yo.docx
 
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docxDiscuss theprinciple events of PROCESS AND THREAD used in both t.docx
Discuss theprinciple events of PROCESS AND THREAD used in both t.docx
 
Discuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docxDiscuss the Windows Registry System Hive1) What information.docx
Discuss the Windows Registry System Hive1) What information.docx
 
Discuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docxDiscuss the way the idea of heroism develops from Gilgamesh th.docx
Discuss the way the idea of heroism develops from Gilgamesh th.docx
 
Discuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docxDiscuss the ways in which the history of the U.S. was presented in t.docx
Discuss the ways in which the history of the U.S. was presented in t.docx
 
Discuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docxDiscuss the value of Lean Systems Engineering to systems develop.docx
Discuss the value of Lean Systems Engineering to systems develop.docx
 
discuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docxdiscuss the various pathways interest groups use to influence politi.docx
discuss the various pathways interest groups use to influence politi.docx
 
Discuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docxDiscuss the various tools and techniques used by an HCO to incre.docx
Discuss the various tools and techniques used by an HCO to incre.docx
 
Discuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docxDiscuss the various means by which slaves resisted the slave system..docx
Discuss the various means by which slaves resisted the slave system..docx
 
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docxDiscuss the typica l clinical presentation of the diagnosis , Hip Os.docx
Discuss the typica l clinical presentation of the diagnosis , Hip Os.docx
 
Discuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docxDiscuss the types of resources, tools, and methods that are availabl.docx
Discuss the types of resources, tools, and methods that are availabl.docx
 
Discuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docxDiscuss the types of items that should be examined in a firewall log.docx
Discuss the types of items that should be examined in a firewall log.docx
 
Discuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docxDiscuss the types of property, providing an example of each an.docx
Discuss the types of property, providing an example of each an.docx
 
Discuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docxDiscuss the type of personality it takes to become a police officer..docx
Discuss the type of personality it takes to become a police officer..docx
 
Discuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docxDiscuss the two major sources of crime statistics for the United Sta.docx
Discuss the two major sources of crime statistics for the United Sta.docx
 
Discuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docxDiscuss the two most prominent theories related to the stage of adul.docx
Discuss the two most prominent theories related to the stage of adul.docx
 
Discuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docxDiscuss the two elements required for the consent defense. In ad.docx
Discuss the two elements required for the consent defense. In ad.docx
 
Discuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docxDiscuss the Truth in Lending Act and what role it places in financia.docx
Discuss the Truth in Lending Act and what role it places in financia.docx
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

This assignment is an opportunity to explore and apply a decisio.docx

  • 1. This assignment is an opportunity to explore and apply a decision making framework to an IT-related ethical issue. A framework provides a methodical and systematic approach for decision making . UMGC Module 2 - Methods of Ethical Analysis (see LEO Content – Readings for week 2) describes three structured frameworks that may be used for ethical analysis, namely Reynolds Seven-Step Approach, Kidder’s Nine Steps, and Spinello’s Seven-Step Process . There are several ways described in UMGC Module 2 to systematically approach an ethical dilemma , and while each of the frameworks described has its merits, each will result in an ethical decision if straightforwardly, objectively, and honestly applied. In addition, consider the ethical theories described in Module 1 – Introduction to Theoretical Ethical Frameworks (see LEO Content – Readings for week 1) which help decision makers find the right balance concerning the acceptability of and justification for their actions. A separate write-up of the ethical theory that supports your decision is part of the following requirements . For this paper, the following five elements must be addressed: Describe a current IT-related ethical issue
  • 2. : Since this is a paper exercise, not a real-time situation, you may want to construct a brief scenario where this issue comes into play, and thus causes an ethical dilemma. The dilemma may affect you, your family, your job, or your company; or it may be a matter of public policy or law that affects the general populace. See the list below for a list of suggested issues, which may be a source of ethical dilemmas . Define a concise problem statement that is extracted from the above description or scenario. It is best if you define a specific problem caused by the dilemma, that needs a specific ethical decision to be made, that will solve the dilemma . Be aware that if it is a matter of public policy or law, that it may require a regulatory body or congressional approval to take action to implement a solution. Analyze your problem using one of the structured decision-making frameworks chosen from Module 2. Make sure that you identify the decision-making framework utilized. In addition, the steps in the decision-making framework selected must be used as major headings in the Analysis section. Consider and state the impact of the decision that you made on an individual, an organization, stakeholders, customers suppliers, and the environment, as applicable! State and discuss the applicable ethical theory
  • 3. from Module 1 that supports your decision. Concerning your paper: Prepare a minimum 3- 5 page, double-spaced paper and submit it to the LEO Assignments Module as an attached Microsoft Word file. Use headings for each topic criteria Provide appropriate American Psychological Association (APA) source citations for all sources you use . In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style. Include a Cover Page with your Name, the UMGC/Name of the Class, and the Title of the Paper. For example, Kidder’s approach has nine steps, which are: Recognize that there is a moral issue. Determine the actor (whose moral issue is it?). Gather the relevant facts. Test for right-versus-wrong issues. Test for right-versus-right paradigms (what sort of dilemma is this?).
  • 4. Apply the resolution principles (ends-based, rule-based, or care- based). Investigate the "trilemma" options (look for common ground or compromise). Make the decision. Revisit and reflect on the decision. (Kidder, 1995, p. 183-187) Reminder: Each of the steps for whatever framework that you select must be a major heading in the Analysis section of your paper. Here are some suggested issues for you to consider, the additional text is designed to help you flesh out the issue: Privacy on the Web: What is happening now in terms of privacy on the Web? Think about recent abuses and improvements. Describe and evaluate Web site policies, technical and privacy policy protections, and current proposals for government regulations. Personal Data Privacy Regulations in Other Countries: Report on personal data privacy regulations, Web site privacy policies, and governmental/law enforcement about access to personal data in one or more countries; e.g., the European Union. This is especially relevant as our global economic community expands and we are more dependent on non-US
  • 5. clients for e-business over the Internet. Computer-Based Crimes : Discuss the most prevalent types of computer crimes, such as Phishing. Analyze why and how these can occur. Describe protective measures that might assist in preventing or mitigating these types of crimes. Government Surveillance of the Internet : The 9/11 attacks on the US in 2001 brought many new laws and permits more government surveillance of the Internet. Is this a good idea? The Digital Divide: Does it exist; what does it look like; and, what are the ethical considerations and impact? Privacy in the Workplace - Monitoring Employee Web and E-Mail Use : What are current opinions concerning the monitoring of employee computer use. What policies are employers using? Should this practice of monitoring, be authorized or not? Medical Privacy : Who owns your medical history? What is the state of current legislation to protect your health information? Is it sufficient? There are new incentives with federal stimulus financing for health care organizations to develop and implement digital health records. Software Piracy : How many of you have ever made an unauthorized copy of software, downloaded software or music (free or for a fee), or used copyrighted information without giving proper credit or asking permission? Was this illegal or just wrong? How is this
  • 6. being addressed? 9 . Consumer Profiling : With every purchase you make, every Web site you visit, your preferences are being profiled. What is your opinion regarding the legal authority of these organizations to collect and aggregate this data? Biometrics & Ethics: Your fingerprint, retinal-vessel image, and DNA map can exist entirely as a digital image in a computer, on a network, or in the infosphere. What new and old ethical problems must we address? Social Networking: What are some of the ethical issues surrounding using new social networks? How are these now considered for business use? What are business social communities? Are new/different protections and security needed for these networks? Gambling in Cyberspace: Is it legal? Are there national regulations and/or licensing? What are the oversight and enforcement requirements? Are there international implications? What are the social and public health issues? Pornography in Cyberspace: For example, the U.S. Supreme Court ruling protecting as free speech computer-generated child pornography Medicine and Psychiatry in Cyberspace: Some considerations include: privacy issues; security; third- party record-keeping; electronic medical records; access to
  • 7. information, even by the patient (patient rights); access to information by outsiders without patient knowledge; authority to transfer and/or share information. Are there any policies proposed by professional organizations? Counterterrorism and Information Systems: Your protection versus your rights Open-source Software versus Closed-source Software: Ethical ramifications and impact on intellectual property law Creative Commons Licenses: How do they work and what are the legal and ethical impacts and concerns? Universal ID card: What is the general position of the U.S. government about issuing each individual a unique ID card? Which individual U.S. government agencies have already provided a unique ID card? What steps have been taken to include individual ID information electronically in passports? How is privacy and security provided? Video Games: Does playing video games distract from everyday responsibilities? Do video games correlate with real world violence? Why do game creators continually increase the violence of video games? What is video game addiction? Cyberbullying: What is cyberbullying and what can be done to stop it? Net Neutrality: What is the current position of the federal government and is it fair to all?