Home » Downloads » Ethical Computer Science

Ethical Computer Science

Guidelines for Research Paper and Presentation

  • Use all four steps in the Four-Step Analysis Process for Ethical Analysis and Decision Making. You may disagree with a particular step in the analysis process; however, you must substantiate your opinion with credible references.  (Use citations in your explanation.)
  • State which stakeholder(s) you identify with and how does this affect your view(s).
  • State your solution. (In identifying the ethical issues in the case, you must state the opinion you support as well as other views addressed in the case.) This will be presented in your conclusion (not in step IV).

Paper Format

 The paper must be 10-typed pages, double-spaced, and use 12 point font. (Use A.P.A. or M.L.A. guidelines for typing your paper.) Paper must include: Title page, Reference page and Table of Contents that are not counted towards the 10-pages of content.

 

  1. Include a Bibliography page, which contains citations/references from the following areas:
    1. Books (if applicable)
    2. Journal articles
    3. Web/internet references

The paper must contain a minimum of 10 total references.

  1. The paper must be submitted in a cohesive and organized The paper will be graded by the criteria of the rubrics (see Course Documents in Blackboard).  
  2. Title page – which includes the topic covered, name and date.
  3. Sub topics covered in the paper must be typed in bold and centered.
  4. Page Numbers – at the bottom centered or right-hand side of page
  5. Any graphs, charts, or other supportive information can be included and noted in the paper.
  6. Bibliography Page, which includes the information in number two.
  7. Table of Contents must contain page numbers

 PAPERS SUBMITTED LATE WILL NOT BE GRADED AND STUDENT WILL RECEIVE A ZERO.

 Presentation Format

  • Each student must give an oral presentation of his or her case study analysis.
  • Each student will have 10 minutes for his or her presentation.
  • Each student will have to present.  Failure of a student’s oral presentation will lead to the reduction of points towards the final grade.
  • Students who miss classmates’ presentations will be deducted a letter grade (see syllabus).

Assessment of Case Study Analysis for Research Paper:

  • The identification of the ethical issues involved in the case.
  • The analyses of the ethical issue using the four-step approach.
  • Debating your position on the ethical issues identified in the case.
  • The illustration of the value of ethics in making decisions about computer technology.

 

 

 

 

 

 

 

…………………Answer Preview…………….

TABLE OF CONTENTS

Introduction……………………………………………………………………..…3-4

Summary of the Study………………………………………………………….….5

HACKING………………………………………………………………..…….…6

Consequence Based Ethical Theories……………………………………….….……6-9

Duty based Ethical theories…………………………………………………………9-10

Character Based Ethical Theories…………………………………………………..10-11

Argument and Counter Arguments…………………………………………………11

Conclusion……………………………………………………………………..……12

Bibliography………………………………………………………………………….13

Reference…………………………………………………………………………….

Introduction

The topic of Hacking and Security is an area that receives attraction from all quarters of the divide.  A host of countries worldwide has their unique cases of hacking in relation to security breaches. The topic is sensitive especially at this time of enhanced terrorism activities that target destabilizing the peace in various parts of the world (Clifford, 2011). Most studies about the security situations in most parts of the world attribute to the fact that terrorism is a security threat number one (Clifford, 2011). It explains the reason nearly all nations are implementing succinct measures aimed at combating the “enemy.”

While one would agree that terrorism is the greatest security threat, one……………

APA

3,311 Words