Recent Question/Assignment

Assessment item 3
Applying Ethical Theory
Value: 20%
Due date: 06-May-2018
Return date: 29-May-2018
Length: 1200-1300 words
Submission method options
Alternative submission method
Task
Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted.
1. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.
2. Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.
3. Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.
You are required to complete the following:
Write an essay:
• The word limit for the essay is 1200-1300 words. Headings, citations and references do not count towards the word limit, but quotations do.
• Analyse the article/case study from the perspective of four classical ethical theories including utilitarianism, deontology, virtue and contract. Present well reasoned arguments for your assessments and recommendations.
• Write an overall conclusion that justifies your recommendations made in your essay.
• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
NOTE: Please use the template provided in resources section of this subject site.
Rationale
This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.
Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:
• ICT professionalism
• Privacy
• Security
• Cyber-crime
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing.
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
• identify an ICT-related ethical issue from a media article or case study;
• apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
• derive logical and justifiable conclusions to resolve the ethical issue(s);and,
• apply proper academic referencing.
Marking criteria
The following marking sheet will be used to assess students' submissions.
Please check that you have met all the criteria before you submit your assignment.
Criteria Standards
High Distinction (HD) Distinction (DI) Credit (CR) Pass (PS) Fail (FL)
Classical Ethical Theory
(Value 60%) Demonstrates an excellent ability at applying ethical theories to the ethical issues.
Demonstrates a good ability at applying ethical theories to the ethical issues. Makes a genuine attempt at applying the ethical theories to the ethical issues. The ethical theories do not link well with the ethical issues. The ethical theories are not properly applied to the ethical issues.
Writing & structure
(Value 20%) Language features and structures are used to convey meaning effectively, concisely, unambiguously, and in a tone appropriate to the audience and purpose with no spelling, grammatical, or punctuation errors. Well developed skills in expression & presentation of ideas.

Fluent writing style appropriate to assessment task/document type.

Grammar & spelling accurate. Good skills in expression & clear presentation of ideas.

Mostly fluent writing style appropriate to assessment task/document type.

Grammar & spelling contains a few minor errors. The text contains frequent errors in spelling, grammar, word choice, and structure, lacks clarity, and is not concise, but the meaning is apparent to the reader with some effort. Rudimentary skills in expression & presentation of ideas.
Not all material is relevant &/or is presented in a disorganised manner.
Meaning apparent, but writing style not fluent or well organised.

Grammar & spelling contains many errors.
Conclusion
(Value 10%) Superior conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. Very high standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. High standard conclusion that ties the results of the analysis together into a coherent, logically valid & convincing argument. Rudimentary conclusion that provides a convincing argument. Sub-standard (or no) conclusion.
Referencing
(Value 10%) Referencing is comprehensive, demonstrates academic integrity, and conforms exactly to APA style conventions. Very good referencing, including reference list and citations.

Evidence of high quality references. Good referencing, including reference list and citations.

Evidence of good quality references. Referencing is comprehensive, mostly accurate according to APA style conventions, and demonstrates academic integrity. Some minor errors or omissions in style and formatting choices (e.g. italics, punctuation, etc) don’t impact on the transparency and traceability of the source, or demonstration of academic integrity. Sub-standard (or no) referencing.
Poor quality (or no) references.

1. Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.
2. Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.
All media article (title) (All topic choose one for essay)
Assignment Topic Links
Idea 1 Automation of Jobs
Idea 2 Relationship with Robots
Can Artificial Intelligences Suffer from Mental Illness?(https://link.springer.com/article/10.1007%2Fs11948-016-9783-0)
Assignment Topic Links
If you are finding it really hard to select a suitable media/news item for the third assessment, you may choose one from the following list: **1) The internet has become like electricity: essential, ubiquitous and invisible. So how should that change how we live? 2) Can a video game company tame toxic behaviour? **Bionic eyes set to switch from fantasy to blinking reality ** Who's Responsible When a Self-Driving Car Crashes? The Year Man Becomes Immortal http://content.time.com/time/magazine/article/0,9171,2048299,00.html ** Drones are now smart enough to follow our every footstep https://www.washingtonpost.com/news/innovations/wp/2016/03/01/drones-are-now-smartenough-to-follow-our-every-footstep/ ** Forced negotiations and industry codes won't stop illegal downloads https://www.efa.org.au/2014/12/12/forced-negs-wont-stop-downloads/ ** Humans are un-made by social media http://blog.practicalethics.ox.ac.uk/2015/02/humans-are-un-made-by-social-media/ ** RANSOMWARE —It’s like VISA—It’s everywhere you want to be https://fortscale.com/blog/ransomware-its-like-visa-its-everywhere-you-want-to-be/ ** Cyber Security: The Balance Between Security And Privacy. http://www.conventuslaw.com/report/cyber-security-the-balance-between-security-and/ ** NHS sharing unfiltered medical data on 1.6M patients with Google AI company http://www.scmagazine.com/nhs-sharing-unfiltered-medical-data-on-16m-patients-with-google-aicompany/article/493730/?utm_content=buffer26109&utm_medium=social&utm_source=linkedin.c om&utm_campaign=buffer ** Alpha Payroll fires employee victimized by W-2 Phishing scam http://www.csoonline.com/article/3064675/security/alpha-payroll-fires-employee-victimized-by-w2-phishing-scam.html ** UK intel agencies spy indiscriminately on millions of innocent folks http://arstechnica.com/tech-policy/2016/04/uk-secret-police-surveillance-bulk-personaldatasets/?utm_content=buffer62167&utm_medium=social&utm_source=linkedin.com&utm_campa ign=buffer ** Email Privacy Act - Good, bad or indifferent? http://www.forbes.com/forbes/welcome/#26ed8937604b ** 21 Scary Things Big Data Knows About You http://www.datasciencecentral.com/profiles/blogs/21-scary-things-big-data-knows-about-you ** Decision-Making Systems Used in Making Ethical Judgments http://smallbusiness.chron.com/decisionmaking-systems-used-making-ethical-judgments76845.html ** Facebook Can Predict With Scary Accuracy If Your Relationship Will Last http://www.huffingtonpost.com.au/entry/facebook-relationshipstudy_n_4784291.html?section=australia ** 5 Extremely Private Things Your iPhone Knows About You http://www.huffingtonpost.com.au/entry/iphone-legal-facts_n_6787876.html?section=australia ** Big Data Knows When You're Going to Quit Your Job Before You Do http://www.bloomberg.com/news/2014-12-29/big-data-knows-when-you-re-going-to-qui
Assignment Topic Links
! Please select topic areas from the links below or provide me a topic you
Chcekout news sites below for additional ideas...
SOME OF THESE TOPICS ARE OLD SO CHECK UP TO DATE ARTICLES
---------
Internet is world's 'greatest spying machine': Assange
http://www.smh.com.au/technology/technology-news/internet-is-worlds-greatest-spying-machine-assange-20110316-1bwoz.html
Every click you take, they'll be watching you
http://www.smh.com.au/digital-life/iphone/every-click-you-take-theyll-be-watching-you-20100917-15gbx.html
Fingerprint scanners concern privacy watchdog
http://www.news.com.au/technology/privacy-watchdog-warns-of-fingerprint-scanners/story-e6frfro0-1225889736646
Cloud Computing Hits Snag in Europe
http://www.nytimes.com/2010/09/20/technology/20cloud.html?hpw
Czech authority halts Google Street View data collection
http://www.smh.com.au/technology/technology-news/czech-authority-halts-google-street-view-data-collection-20100915-15bkm.html
Privacy breach worries Google users
http://www.mynorthwest.com/category/local_news_articles/20100915/Privacy-breach-worries-Google-users/
Google CEO: Ich bin ein Berliner und ein Frankfurter und ein Hamburger. And, Potsdam to the rest of you
http://www.telecomtv.com/comspace_newsDetail.aspx?n=46663&id=e9381817-0593-417a-8639-c4c53e2a2a10#
Web of Lies
http://pr-usa.net/index.php?option=com_content&task=view&id=483940&Itemid=30
Google is watching you
http://www.taiwantoday.tw/ct.asp?xitem=114806&CtNode=426
Facebook Tells People Where You Are
http://www.jabberlounge.com/facebook-tells-people-where-you-are/221953/
The facial recognition software that could identify your photo online
http://www.marieclaire.co.uk/news/world/496664/the-facial-recognition-software-that-could-identify-your-photo-online.html
Swiss Top Court on Anti-P2P: Collecting IP Addresses is Invasion of Privacy (ALSO UNDER IP)
http://www.zeropaid.com/news/90602/swiss-top-court-on-anti-p2p-collecting-ip-addresses-is-invasion-of-privacy/
Law proposed against uploading violent images on the internet
http://www.smh.com.au/technology/technology-news/law-proposed-against-uploading-violent--images-on-the-internet-20110316-1bwye.html
Watson the supercomputer put to work in health insurance
Read more: http://www.smh.com.au/technology/sci-tech/watson-the-supercomputer-put-to-work-in-health-insurance-20110913-1k6k9.html#ixzz1XtTqsJA7
SBS warns of digital 'ghettos' as a result of the NBN
http://www.smh.com.au/technology/technology-news/sbs-warns-of-digital-ghettos-as-a-result-of-the-nbn-20110309-1bnso.html
Curbs on war robots urged
http://www.smh.com.au/technology/technology-news/curbs-on-war-robots-urged-20100917-15g98.html
Who needs writers when an algorithm can do the job
Read more: http://www.smh.com.au/technology/technology-news/who-needs-writers-when-an-algorithm-can-do-the-job-20110912-1k5y3.html#ixzz1XtTxL47L
Swiss Top Court on Anti-P2P: Collecting IP Addresses is Invasion of Privacy
http://www.zeropaid.com/news/90602/swiss-top-court-on-anti-p2p-collecting-ip-addresses-is-invasion-of-privacy/
Cor blimey! British ISPs must fund P2P copyright crackdown
http://arstechnica.com/tech-policy/news/2010/09/should-isps-pay-for-p2p-warning-letters-uk-says-yes.ars
Huge Selection of Articles on Wikileaks
http://www.google.com.au/#hl=en&biw=1094&bih=743&q=wikileaks&um=1&ie=UTF-8&tbo=u&tbs=nws:1&source=og&sa=N&tab=wn&fp=53d07893cd0ed68f
'Internet censorship is trade barrier', says Google exec
http://www.theregister.co.uk/2010/09/09/google_pressure_on_censorship/
Wiki Leaks
http://www.theregister.co.uk/2010/08/06/wiki_pentagon/
http://www.theregister.co.uk/2010/06/07/wikileaks_arrest/

Editable Microsoft Word Document
Word Count: 1453 words including References


Buy Now at $19.99 USD
This above price is for already used answers. Please do not submit them directly as it may lead to plagiarism. Once paid, the deal will be non-refundable and there is no after-sale support for the quality or modification of the contents. Either use them for learning purpose or re-write them in your own language. If you are looking for new unused assignment, please use live chat to discuss and get best possible quote.

Looking for answers ?