Project Grading Rubric Course: IT590 Unit: 6 Points: 200 Copyright Kaplan University Project 6 Outcomes addressed in this activity: Unit Outcomes: ? Complete the final project Course Outcome: ?...

1 answer below »

Project Grading Rubric Course: IT590 Unit: 6 Points: 200 Copyright Kaplan University Project 6 Outcomes addressed in this activity: Unit Outcomes: ? Complete the final project Course Outcome: ? IT590-1: Analyze legal and ethical issues in the field information technology. ? IT590-2: Apply ethical theories to information technology case studies. ? IT590-3: Discuss recent legislation related to ethical computing. ? IT590-4: Evaluate differences in ethical codes of information technology conduct in different cultures. Project Instructions: Throughout this course, you have analyzed and discussed case studies and issues on key ethical issues in information technology. Now it is time to build your own framework for a code of ethics. You will refine your material, bring it together, provide an overall rationale for your code, and give commentary for each part as a finished project as your Unit 10 requirement. Compile your research on existing codes of ethics and develop a code of ethics for information technologists. Use classical precepts and principles from ethical thinkers to justify each component of your code. This code of ethics should cover the key issues that are covered in this course. Choose one of the topics below: ? Ownership of information. ? Preventing spam, email viruses, Denial-of-Service ? Computerized invasion of privacy. ? Developing policies for handling consumer information or Anonymity and identity. ? Plagiarism. ? Releasing buggy or imperfect software. ? Encryption Control Act ? Copyright Protection. ? Another topic approved by your instructor. Project requirements: Submit a research paper that is 6–8 pages in length, excluding cover page, table of contents, and references. Your final paper’s content should synthesize course concepts and a review of supporting material; presents a general understanding of the selected topic. In addition, your paper should include: Paper must include 5–7 references to existing sources to support points of position. Your sources can be from course texts or assigned readings however utilizing the Kaplan online library is preferred. Project Grading Rubric Course: IT590 Unit: 6 Points: 200 Copyright Kaplan University All in-text citations and references are presented using APA style and formatting guidelines. When completing your assignment, take a clear stand on whether a particular action or decision is right or wrong and then defend your position through the use of one or more of the practical ethical theories described in the book. Save file as Project6_yourlastname.doc and submit to the drop box. ? Paper must include citations/references to support viewpoints. ? Length: Minimum 6-8 pages, (not including cover page) 12 pt type, double-spaced and free of spelling errors. Review the grading rubric below before beginning this activity. 200 point project grading rubric Project Requirements / criterion Maximum points possible for satisfactory completion of task Points earned by student 1. Analyze legal and ethical issues in the field information technology. ? Clearly analyzes and evaluates an ethical theory and is well written and provides examples. ? Evaluation is well written at the university level. 0-40 points 2. Apply ethical theories to information technology case studies. ? Formulates and makes recommendations to address ethical issues and summarizes opinion based on an ethical theory. ? Discussion is well written at the university level. 0-40 points 3. Discuss recent legislation related to ethical computing. 0-40 points Project Grading Rubric Course: IT590 Unit: 6 Points: 200 Copyright Kaplan University ? Researches recent legislation regarding ethical computing and formulates an opinion based on an ethical theory. ? Discussion is well written at the university level. 4. Evaluate differences in ethical codes of information technology conduct in different cultures. ? Evaluates and makes recommendations to address differences in ethical codes of information technology conduct in different cultures in a very clear and detailed way. ? Discussion is well written at the university level. 0-40 points 5. Paper is supported with proper sources related to Ethical and Legal issues in IT ? Paper must include 5–7 references to existing sources to support points of position. ? Paper follows correct APA formatting ? Writing is error-free and is at the university level 0-40 points Column Total

Answered Same DayDec 21, 2021

Answer To: Project Grading Rubric Course: IT590 Unit: 6 Points: 200 Copyright Kaplan University Project 6...

Robert answered on Dec 21 2021
121 Votes
Policies for Handling Consumer Information or Anonymity and Identity
Running Head: POLICIES FOR HANDLING CONSUMER INFORMATION OR
1 ANONYMITY AND IDENTITY
PAGE
9
POLICIES FOR HANDLING CONSUMER INFORMATION OR ANONYMITY AND IDENTITY
Policies for Handling Consumer Information or Anonymity and Identity
Name
Institution
Policies for Handling Consumer Information or Anonymity and Identity
Introduction
Information
systems have given rise to more complex ethical issues, with one of the common issues being privacy protection of the users. Handling of consumer information or anonymity and identity ethically is of utmost importance in maintaining consumer trust and ensuring that privacy protection is adhered to. This is important in preventing a wide array of issues such as identity theft, espionage, fraud among others (Pavlou, 2011). One of the most important assets to an information technology company or professional is their reputation for ethical practices and protection of data that consumers have entrusted to their care. This paper evaluates already existing code of ethics in handling of consumer information or anonymity and privacy, and develops a code of ethics meant to guide information handling, anonymity and privacy.
Legal and Ethical Issues in Handling Consumer Information or Anonymity and Identity
There are a wide array of ethical and legal issues in handling consumer information, anonymity and identity. Insider trading is one of these issues sensitive private consumer data may be used by a professional for personal gain (Whitman & Mattord, 2011). Such factors result to a breach in security of such information. Personal privacy is another ethical and legal issue with regard handling of information. Many online organisations collect information through online trading and payments or from cookies and software updates (Whitman & Mattord, 2011). The integrity of how such information is handled has raised concern over privacy and confidentiality protection.
A key legal issue in handling of consumer information as well as anonymity and privacy has been identity theft. This occurs when individuals use another individual’s personal information to commit crimes and fraud without the knowledge of the person. The Federal Trade Commission (FTC) (cited in Whitman & Mattord, 2011, p. 108) notes that over nine million Americans are faced with identity theft cases with most being a result of breach on the security of consumer data. While legislations on Identity theft have been passed in various states, these remain a sensitive matter with most consumers being cautious in providing personal information online (Belanger & Crossler, 2011, p. 1020).
Another legal and ethical issue in handling of inflation is corporate espionage. Corporate espionage may result to unethical handling of sensitive consumer data as well as reveal participating individuals who may prefer to remain anonymous (Pavlou, 2011). Such information breach may result to serious consequence for the clients. These ethical and legal issues are what mainly guide the codes of conducts within organisations in order to ensure that such codes and policies effectively address them, and protect identities and critical information.
Research on Existing Codes of Ethics
Codes of ethics in information technology have l become increasingly important even as such technology has continued to evolve. Various organizations have established codes of ethics that information technology professionals need to follow. While there are quite a number of codes of ethics developed by professional organisations, most employees follow the policies and procedures established by their employers.
A review of the code of ethics for major information technology professional organisations showed that each required respect for privacy and protection of information and honour of confidentiality that the IT professional have been imbued with (Whitman & Mattord, 2011, p. 108). Association of Computing Machinery (ACM) provided 24 imperatives that are important in ensuring information security and integrity. In code 1.7 of the ACM codes of ethics , it is required that there be a clear way in which all personal information...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here