The research assignment requirements can be found in the description section.

Anonymous
timer Asked: Nov 2nd, 2018
account_balance_wallet $30

Question Description

Part One: Privacy

What is your opinion of the recent controversy over government monitoring of citizens' phone and email communications? Consider: Should a line be drawn on further invasions of privacy?

Note: Initial Response and two (2) follow-up responses and reference (s).


Part Two: Paper B1: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy.

This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, related to privacy subject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law.

See EPIC Privacy Issues at: http://epic.org/privacy/ See List on left and/or: EFF Privacy athttps://www.eff.org/issues/privacy [see list in center on this page].

This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics.

  1. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics principles below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.
  2. Prepare the Ethical Issue matrix and include the following explanation (200 words) —double-space your narrative—below the matrix:
  1. Why I chose the dilemma;
  2. Why I chose the three principles; and
  3. An analysis of the research used to identify the actions in the matrix.

The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders.

  1. Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

This assignment is directly related to Paper-B2. The ethical issue identified in this assignment will be used in your Paper B2 Assignment. Paper B2 asks you to write a policy that corrects the ethical issue described in Paper B1.

Normative Ethics List

Autonomy: is the duty to maximize the individual's right to make his or her own decisions.

Beneficence: is the duty to do good both individually and for all.

Confidentiality: is the duty to respect privacy of information and action.

Equality: is the duty to view all people as moral equals.

Finality: is the duty to take action that may override the demands of law, religion, and social customs.

Justice: is the duty to treat all fairly, distributing the risks and benefits equally.
Non-maleficence: is the duty to cause no harm, both individually and for all.
Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted.

Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

Respect for persons: is the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end.

Universality: is the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative.

Veracity: is the duty to tell the truth.

A sample template for the matrix is shown below. To reconstruct the sample template, you may use the Table Tool in MS Word or copy and paste this template.

Ethical issue:

Stakeholders

(Principle 1)

(Principle 2)

(Principle 3)

1

2

3

4

Step 1: Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site.

Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc. Be sure that each stakeholder category is unique and not similar to another category you use.

Step 3: Choose any three (only three) of the principles that might apply to your issue such as autonomy, publicity, and veracity.

Step 4: identify how the ethical issue affects each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder.

Sample Completed Matrix

Ethical issue: falsifying your profile on a social networking site

Stakeholders

autonomy

publicity

veracity

1: Yourself

You have the duty to maximize the right to make your own decisions.

You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved.

You have the duty to tell the truth

2: Other users of the networking site

They have the duty to make their own decisions

They make these decisions based on ethical standards that should be recognized by the person falsifying their profile

They assume that the person falsifying the profile has the duty to tell the truth.

3: The social networking site

The autonomy of the site is limited by law (Goldman, 2007)

Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all.

As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007)

Reference:

Goldman, E. (2007, May). Social Networking Sites and the Law. Retrieved fromhttp://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf


Note: Can you please separate this assignments?

Tutor Answer

DrPrinsen
School: Purdue University

Attached.

1

Running head: PRIVACY

Privacy
Name:
Institution:
Course Code:

PRIVACY

2
Part One: Recent Controversy over Government Monitoring Citizens Phone
and Email Communications
Ever since the enactment of the Patriot’s Act after the 9/11 attacks, the

government has received a lot of backlash regarding its policy on surveillance and monitoring of
criminal activity. The government argues that it is necessary to monitor the private
communication patterns of its citizens due to the infiltration of terror cells and other criminal
elements in the fabric of the American community ("Americans’ Views on Government
Surveillance Programs", 2018) . They state the developed secrecy and homogenous nature of
such elements with other members of the society makes it increasingly difficult to identify
threats. This argument is the justification of the blatant infringement of people’s privacy rights.
Why a line should be drawn
While the government’s arguments may be correct, to some extent, there should
be a separation of persons of interest in investigations and ordinary citizens. The fact that the
government uses digital criminal activity as a scapegoat for treating all citizens as potential
criminals is both discriminatory and disappointing. The government has a responsibility to
protect its citizens, not treat them like criminal suspects in the premise of protection. The point of
concern and controversy is the government’s tendency to use the loopholes provided in the
explanations above to monitor civilians who are not associated with criminal elements
("Americans’ Views on Government Surveillance Programs", 2018). This fact is seen in the
famous Snowden incident among other incidences. The government needs to develop a
framework that essentially separates persons of interest with innocent civilians. This framework
should involve, first and foremost, active monitoring of social media and dark web activity to
determine who is exposed to radicalizing content or who is in contact with criminal activity.

PRIVACY

3

Only then can monitoring of people’s private information be justifiable, by ethical, legal and
moral standards. This framework would prove efficient given the fact that most criminal
activities take place online.
Part Two: Paper B1 (A Matrix Mapping of Safeguarding Mental Health
Records of Persons Seeking Firearms)
Stakeholders
1. The

Beneficence

Publicity

Veracity

People seeking

They must seek

They must tell the

Individuals

firearms must disclose firearms based on the

truth and not conceal

Seeking Guns

all past mental issues

required legal and

important mental

that may influence

ethical standards that

information that may

whether they are

are enshrined by law

influence their

granted the firearm.

and known to all.

handling of the said

This potential to harm

firearm.

others should
foreshadow the desire
to protect oneself
(Appelbaum, 2013).
2. The Fed...

flag Report DMCA
Review

Anonymous
Excellent job

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors