• Home
  • Blog
  • The paper should be 7-10 pages long. You need to analyze the case from 4 stakeholder perspectives, and you should include 1 philosophical ethical principle in your analysis from each stakeholder perspective. You should also apply 3 rules from Miller et al

The paper should be 7-10 pages long. You need to analyze the case from 4 stakeholder perspectives, and you should include 1 philosophical ethical principle in your analysis from each stakeholder perspective. You should also apply 3 rules from Miller et al

0 comments

Final Case Study assignment:

This assignment is the same as Case Study 2 but it is now research paper. The paper should be 7-10 pages long. You need to analyze the case from 4 stakeholder perspectives, and you should include 1 philosophical ethical principle in your analysis from each stakeholder perspective. You should also apply 3 rules from Miller et al.’s 5 rules in your discussion. This should be the foundation of a discussion of the ethical/social issues in the case from a professional perspective.

You need to write on the following topics:

See Topics Sheet. If you decide on another topic ok it with me.

Steps in Ethical Case Analysis

1. Get the facts straight. Review the case. Briefly recap the details of the case at the beginning of your paper. You need to explain how your case is an example of e.g. Cyber Warfare, Cyber Espionage or Cyber Crime.

2. Identify the central stakeholders in the case.

3. Identify the technical problems in the case.

4. Identify the Ethical problem or problems in the case.

5. Identify the Social problem or problems in the case.

6. Solve the technical, ethical and social problems using both technical, ethical standards.

7. Will your solution to the problem withstand criticism from the perspectives of both a variety of Ethical principles, code of conduct, and Professionals in your field?

8. What recommendations can you make about the problems in the case based upon your ethical analysis?

When you construct your analysis be sure and remember that we are assigning a 7-10 page analysis. With this length limitation it is important to realize that you will probably only be able to look at the problems in the case from an IT professional’s perspective. If you try to analyze every stakeholder perspective you will probably exceed the length limitation.

Grading and Evaluation of Papers

1. What are the objectives of the papers?

A.

i. To become sensitized to the ethical issues in Engineering and Information Technology.

ii. Learn how to analyze a case.

iii. Learn how to identify the major stakeholders in a case.

iv. Learn how to identify the technical problems in a case.

v. Learn how to identify the ethical problems in a case.

vi. Learn how to apply ethical principles to a case.

vii. Learn how to make recommendations in a case based upon ethical analysis.

B.

a. Critical thinking

i. Did you identify and focus on the crucial material and facts in the case?

ii. Did you support claims you make about the case with facts?

iii. Did you think about the case from a variety of stakeholder perspectives?

b. Ethical analysis

i. Did you identify the central Ethical problem(s)

ii. Did you conduct a well thought out ethical analysis by applying 3 ethical principles?

iii. Did you conduct a well thought out ethical analysis by applying 3 principles from a code of ethics in your analysis?

iv. Did you justify ethical judgments with accurate facts and ethical principles?

v. Did you think about the case from a variety of ethical perspectives?

How will your papers be assessed?

Evaluations of Papers (Percentages)

A. The Case Recap (.10)

i. Do you highlight the key points in the case?

a. Are the facts in the case accurate?

b. Did you focus on the crucial aspects of the case?

c. Did you avoid including non essential or superfluous information?

B. Stakeholders (.10)

i. Who are the primary and secondary stakeholders in the case?

ii. Did you clearly identify from which stakeholder perspective you are analyzing the material in the case?

a.From whose perspective are you analyzing the case?

C. What is the central technical problem? (.10)

i. How is the central technical problem related to the ethical problems in the case?

D. What is/are the ethical problem/problems (.10) and what are the social issues (.10)? Total (.20)

i. What ethical problems do you see in the case?

ii. What is the central ethical problem?

iii. Why is this the central ethical problem?

E. What ethical principles/what principles from Miller’s 5 rules, apply to the central ethical problem? (.30)

i. Do you correctly define the ethical principles you use?

ii. Have you correctly applied the ethical principles you use?

iii. Do the principles you use withstand obvious criticisms from other ethical perspectives?

F. What are your recommendations? (.20)

i. Are your recommendations based upon your ethical analysis?

ii. Do your recommendations link to your ethical analysis?

iii. Rather than stating the obvious ( e. g. this problem could have been easily solved if … ) what do you recommend for similar cases in the future?

Final Paper Topics:

Cyber bullying/Tyler Clementi/Zoe Johnson/Carla Jamerson

Cybercrime

Sexting

Anonymous/ Vigilanteism/Online Protests

Project Chanology

Operation Payback

Operation Aurora

Operation Cast Lead

Anonymous and Arab Spring

Anonymous and ISIS

North Korea and Sony Pictures

Apple v. US Govt

Assange, Wikileaks and Collateral Murder/Assange, Wikileaks and DNC/ Assange, Wikileaks and French Election

Snowden Revelations

Viruses

Morris worm

Duqu

Flame

Gauss

Medstar Hospital Attack (Ransomware)

Cyber Espionage

Exfiltration

Attacks

Cyber Security

Hacker Black Hat

Hacker White Hate

Hacker Gray Hat

Cyber Terrorism

Al Qaeda (Online Terrorism)

ISIS (Use of Social Media)

Cyberwarfare

Estonia

Georgia

Ukraine

Operation Buckshot Yankee

Eligible Receiver

Solar Sunrise

Moonlight Maze

Titan Rain

Stuxnet

Topics (Find case Studies)

Algorithyms

Autonomous Cars

Fake News #pizzagate, Sandy Hook, Facebook and Fake News, DNC hack

Internet of Things

Robotics

Biometrics

Big Data

Virtual Reality

Weapons system

Presidential use of Twitter

Hacking the F-35

Artificial Intelligence

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}