Analyzing Ethical Dilemmas in Assignment Part 2
Added on 2023-01-04
19 Pages5506 Words24 Views
|
|
|
1
Assignment Part 2: Analyzing Ethical Dilemmas
Student Name
Student Code
Subject Name
Subject Code
Assignment Part 2: Analyzing Ethical Dilemmas
Student Name
Student Code
Subject Name
Subject Code
2
CONTENTS
1. Introduction...............................................................................................................................4
2. Analysis.....................................................................................................................................5
2.1 Legal Factors..........................................................................................................................5
2.1.1Factor 1- Data breach........................................................................................................5
2.1.2 Factor 2- Intellectual copyright........................................................................................5
2.1.3 Factor 3- Concealing information....................................................................................5
2.2 Professional Issues.................................................................................................................6
2.2.1 Factor 4- information Security.........................................................................................6
2.2.2 Factor 5- Leadership style................................................................................................6
2.2.3 Factor 6- Appropriating data............................................................................................6
2.2.4 Factor 7- Inappropriate behavior......................................................................................7
2.2.5 Factor 8- Cloning Business..............................................................................................7
2.2.6 Factor 9- Unappreciative attitude.....................................................................................8
2.2.7 Factor 10- Unfair work opportunities..............................................................................8
2.2.8 Factor 11- Inaction...........................................................................................................8
2.2.9 Factor 12- Dishonesty......................................................................................................9
2.2.10 Factor 13- Fairness.........................................................................................................9
2.2.11 Factor 14- Whistleblowing...........................................................................................10
2.3 Personal factors....................................................................................................................10
2.3.1 Factor 15- Retribution....................................................................................................10
2.3.2 Factor 16- Personal relationships...................................................................................10
2.3.3 Factor 17- Hiding Information.......................................................................................11
2.4 Intrinsic factors....................................................................................................................11
CONTENTS
1. Introduction...............................................................................................................................4
2. Analysis.....................................................................................................................................5
2.1 Legal Factors..........................................................................................................................5
2.1.1Factor 1- Data breach........................................................................................................5
2.1.2 Factor 2- Intellectual copyright........................................................................................5
2.1.3 Factor 3- Concealing information....................................................................................5
2.2 Professional Issues.................................................................................................................6
2.2.1 Factor 4- information Security.........................................................................................6
2.2.2 Factor 5- Leadership style................................................................................................6
2.2.3 Factor 6- Appropriating data............................................................................................6
2.2.4 Factor 7- Inappropriate behavior......................................................................................7
2.2.5 Factor 8- Cloning Business..............................................................................................7
2.2.6 Factor 9- Unappreciative attitude.....................................................................................8
2.2.7 Factor 10- Unfair work opportunities..............................................................................8
2.2.8 Factor 11- Inaction...........................................................................................................8
2.2.9 Factor 12- Dishonesty......................................................................................................9
2.2.10 Factor 13- Fairness.........................................................................................................9
2.2.11 Factor 14- Whistleblowing...........................................................................................10
2.3 Personal factors....................................................................................................................10
2.3.1 Factor 15- Retribution....................................................................................................10
2.3.2 Factor 16- Personal relationships...................................................................................10
2.3.3 Factor 17- Hiding Information.......................................................................................11
2.4 Intrinsic factors....................................................................................................................11
3
2.4.1 Factor 18- Childhood.....................................................................................................11
2.5 Prioritisation.........................................................................................................................11
2.6 Decision...............................................................................................................................12
3. Analysis Discussion................................................................................................................13
4. Analysis Conclusion...............................................................................................................13
5. Learning outcomes of this course...........................................................................................14
5.1 Technology Ethics...........................................................................................................14
5.2 The ethical technologist..................................................................................................14
5.3 Habits of the Effective Technologist..............................................................................15
5.4 ACS Code of Professional Conduct................................................................................15
5.5 Ethical Issues of the Information Age.............................................................................16
5.6 Thinking Machines.........................................................................................................16
5.7 The Common Denominator............................................................................................17
5.8 AI and Human Potential..................................................................................................17
6. References...............................................................................................................................19
2.4.1 Factor 18- Childhood.....................................................................................................11
2.5 Prioritisation.........................................................................................................................11
2.6 Decision...............................................................................................................................12
3. Analysis Discussion................................................................................................................13
4. Analysis Conclusion...............................................................................................................13
5. Learning outcomes of this course...........................................................................................14
5.1 Technology Ethics...........................................................................................................14
5.2 The ethical technologist..................................................................................................14
5.3 Habits of the Effective Technologist..............................................................................15
5.4 ACS Code of Professional Conduct................................................................................15
5.5 Ethical Issues of the Information Age.............................................................................16
5.6 Thinking Machines.........................................................................................................16
5.7 The Common Denominator............................................................................................17
5.8 AI and Human Potential..................................................................................................17
6. References...............................................................................................................................19
4
INTRODUCTION
The case study presents some crucial ethical issues and dilemmas confronted by the main
characters involved. Richard is the owner of Firestone- a company dealing with promotional
offers and campaigns for customers, alongside profit-making services like selling customer lists
and demographic details. Reaper is a new division formed by Firestone, of which Alex is the
project manager and Sophie is a hired independent consultant. The study highlight a series of
problems for Richard, the owner of Firestone, as a result of the decisions taken by Alex and
Sophie against their moral and ethical conduct.
The report will use the Ethical Decision Model (EDM)4 to analyze the ethical challenges
presented in the given case study. The analysis will be followed by prioritizing the identified
ethical issues and concerns and discussing the presented analysis with relevant ethical theories
and concepts. The final part of the report highlights the learning outcomes from the case study
analysis.
INTRODUCTION
The case study presents some crucial ethical issues and dilemmas confronted by the main
characters involved. Richard is the owner of Firestone- a company dealing with promotional
offers and campaigns for customers, alongside profit-making services like selling customer lists
and demographic details. Reaper is a new division formed by Firestone, of which Alex is the
project manager and Sophie is a hired independent consultant. The study highlight a series of
problems for Richard, the owner of Firestone, as a result of the decisions taken by Alex and
Sophie against their moral and ethical conduct.
The report will use the Ethical Decision Model (EDM)4 to analyze the ethical challenges
presented in the given case study. The analysis will be followed by prioritizing the identified
ethical issues and concerns and discussing the presented analysis with relevant ethical theories
and concepts. The final part of the report highlights the learning outcomes from the case study
analysis.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Professional Issues Assignment: Part 2lg...
|13
|4265
|83
Ethical Issues in the IT Industry: A Case Studylg...
|12
|3188
|471
Professional Issues Assignment Part 1lg...
|10
|3398
|95
Social and Professional Issueslg...
|14
|3144
|434
Social and Professional Issueslg...
|9
|2768
|90
Professional Issues Assignment: Part 2lg...
|16
|5764
|90