Category: Information ethics

  • Part 3: Last 3 Annoations

    For Part 3, complete another group of annotations, just as you did for Part 2. However, this time all of your sources must take the other side of the issue. For example, if you found sources for Part 2 that took the side that individual online freedoms outweighed security needs, its time to take the opposite side and locate sources that argue for security over individual freedom.

    Part 2 was consisted of Part 2: First Three Annotations

    For Part 2, use the skills you have gained in locating sources to find two credible sources (a peer-reviewed article and a nonacademic source) and one non-credible source on your topic. All three sources should take the same or a similar side on the issue you chose. For example, if you are writing about the balance between individual freedom and online security, your first three sources might all take the side that individual online freedoms should outweigh security needs.

    For each sources annotation, provide an APA reference, a brief summary, and a short evaluation. In your evaluation, be sure to respond to the following questions:

    • What makes this source credible or not credible?
    • How is this source useful to you for your final project, or how would it harm your credibility if you used it in your project?

    We are only focusing on part 3 but using the the same questions in part 2 for part 3

    My topic I chose was Mandated vaccinations in USA

  • MGMT 290 Case Brief 2

    Tasks: Post Case Briefing for Chapter 2;

    The case that you will be doing this case brief on will be in the attached pdf below, make sure to read it to understand and complete the brief case.

    Make sure to follow the format/outline in the word doc attached below titled “How to Brief a Case”. The Case Brief you have to complete should follow that same format. Make sure you are covering ALL points mentioned in the outline “How to Brief a Case” when doing your Case Brief. Keep the facts to a minimum; only the pertinent facts should be included.

    You will have to research the case for more information. At the bottom of the last page of the Brief please cite the sources you used in your research in APA format 7th edition. Please Include at least 2 sources.

    Please reply to one classmate.

    Make the Case Brief as long as needed, as long as you follow the outline attached below named “How to Case a Brief.” If you need me to add a tip I’ll gladly add the amount that’s necessary. Just please follow the outline and write as much as necessary.

    And when responding to the one classmate’s Case Brief please detail the relationship between your Case Brief and your classmate’s in 3 to 5 sentences.

    I will give you their responses so you can reply to them after you’ve done your Case Brief.

    Attached Files (PDF/DOCX): MGMT 290 Case Brief 2.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • homework

    You will watch this film, take notes and submit your reflection. You will submit your notes with your reflection, so make sure to take notes right from the beginning! Please note, this may seem like a lot of work, but I’m elaborating on the steps because I would like you to follow them all carefully. Another note: please pace yourself; do not try and do this assignment in one sitting.

    Get Access

    It is available on Amazon Prime. If you do not have Amazon Prime, you can use the free trial, or it is $2 to rent.

    Time to watch!

    Watch this documentary, but do NOT just watch it passively!

    I would like to introduce you to a workflow that you may not be familiar with. While you watch, keep a notebook or your computer close by. It is way too easy when watching a video to sit by passively; however, videos are an extremely powerful way to learn, especially in today’s remote learning world.

    When you hear any of the following, write them down as a quote, snippet or blurb:

    A concept or an idea that you think is important / significant.

    A quote that stands out. (You are required to include at least two in your final reflection!).

    Something you want to know more about.

    Something you have a question about.

    When you write down a quote, you should use quotation marks in your notes and you should write the name of the person who said the quote right after, so that they are credited.

    In addition, perhaps most importantly, wherever you are taking notes, be prepared to record. This means that if you are taking notes on pen and paper, you should be holding your pen in writing position while watching, so you can take notes immediately. Same thing for a Google Doc, maybe you would have a second screen of a phone to minimize the problem of switching programs/tabs.

    You will submit your notes in the same .doc file, at the beginning of the document.

    Time to reflect!

    Now that you have you have your notes, write a narrative reflection, weaving together your notes and your thoughts. Use your own words to discuss areas that are of interest, as well include the quotes from people in the film.

    Your reflection should be 400 words minimum (not including the notes section), should use appropriate grammar, punctuation and professional writing, and should feature in-text citations and a references section in APA format.

    Final Words

    This is a wonderful documentary and an interesting topic – have fun and I’m looking forward to your thoughts!

  • Weekly Reflection 5: Intellectual Property vs. Public Domain

    Reflect on any of the readings from this week on the different approaches to ethics and morality. How are you currently thinking about your own sense of ethics? Has your exposure to these readings caused you to think differently about your ethical judgment?

    Reading:

    https://www.theverge.com/23929233/lawrence-lessig-free-speech-first-amendment-ai-content-moderation-decoder-interview

    Attached Files (PDF/DOCX): Appel et al 2023 Generative AI has an Intellectual Property Problem.pdf, Lessig 2006 Recrafting a Public Domain.pdf, Alfino 1991 Intellectual Property and Copyright Ethics.pdf, Lumen Intellectual Property Summary.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Ethical dilemmas in IT

    Hide Assignment Information Instructions Case Analysis of Ethics communication iconWhat to do & Why? Ethical situations are all around us. While what may seem like common sense may get really difficult when put in that situation. Someone may have leverage on you, threaten you, or put you in some other situation that feels like your hand is being forced. Reviewing situations and thinking about how you would handle them will help you in your career. Many of the situations may have not even have been a concern when you come across them. info iconHow to do it? Select ONE of the following cases. Case 1: You are an intern at a major corporation. Your primary job is to maintain high ranking administrators computers including cleaning and removing viruses, cleaning up files using company provided tools, and defragmenting disks. During your maintenance you have noticed that the Chief Operating Officers (COO) computer contains some pornographic images and movies. You also know that the Chief Operating Officer is a close friend of your immediate supervisor who also reports to the COO. What is your course of action in this scenario? Case 2: You work as a part-time network administrator to create and maintain user accounts. One of your colleagues constantly asks you to cover his shift so he can leave early by not only offering you the additional hours you’re covering for him, but a couple extra hours for being a team player. What is your course of action in this scenario? Case 3: You work as a full-time programmer in a small software development company. Your friends at a nearby corporation always invite you for lunches or happy hours with them. You want to maintain friendship with them so they may give you information on job openings at their firm. Your company offers a half-hour lunch time and most happy hours begin at 4:00 pm while your working hours end at 5:00 pm. What is your course of action in this scenario? Case 4: You are a full-time information security analyst. The Anonymous group contacted you and is offering you $1,000 in bit coins every week to send daily security log files to them that have information embedded in the logs that you don’t think is important to anybody. What is your course of action in this scenario? Case 5: You work in a data center as a backup and restore specialist. The company you work for is under investigation and certain backup files and logs are needed to facilitate this investigation. You are requested by a manager two levels above you, who is under investigation, to say those files were corrupt and unavailable and they have indicated they would make it worth your while to do so. What is your course of action in this scenario? Case 6: You work as a technician at a major record company. Your friends ask you to occasionally download songs that you have access to via the record company onto a USB thumb drive and send them to them when you get home. What is your course of action in this scenario? Case 7: You work in a school as a computer technician. You are also enrolled in the same school as a student. You get a new job in the IT department for a different company and you quit your current job at your school. When you are in class you noticed that your previous supervisor at the school didnt change the administrator password and the computer class’ desktop computers are missing an application that should have been installed. What is your course of action in this scenario? Case 8: You work at a company as a computer technician. You notice that some of the computer hardware inventory including monitors, RAM, storage drives, projectors, etc., are missing or contain unexpected items. In particular, you notice that instead of having eight 8GB memory modules in your inventory, you have eight 4GB memory modules. You also notice that instead of two Intel Xeon processors, you have three AMD processors. You suspect that your immediate supervisor has modified the inventory and descriptions of some of the items in the database. What is your course of action in this scenario? Then… Identify and explain in detail what the ethical issue is presented in the scenario you selected. Explain in detail the potential results or outcomes for you the IT professional and for the person in question if the ethical issues are not addressed? What are the correct options or solutions that you should address or provide to properly rectify the scenario? upload iconWhat to submit? Please write a position paper (with the following format: Arial, 11 point size, 1.5 line spacing, and 500 600 words minimum) to analyze ONE of the scenarios above. Please upload your word document to this assignment link to receive credit. Due on Feb 5, 2026 11:59 PM Available on Jan 22, 2026 12:01 AM. Access restricted before availability starts. Available until Mar 5, 2026 11:59 PM. Submission restricted after availability ends.
  • Weekly Reflection 4: Personal Privacy

    Reflect on any of the readings from this week on the different approaches to ethics and morality. How are you currently thinking about your own sense of ethics? Has your exposure to these readings caused you to think differently about your ethical judgment?

    Attached Files (PDF/DOCX): Wilmer Hale Year in Review US Data Privacy Policy Developments.pdf, The Ethics of Managing Peoples Data.pdf, Nothing to Hide Chapters.pdf, Cohen What Privacy is For.pdf

    Note: Content extraction from these files is restricted, please review them manually.