CHANGE this heading to you future Job Title First and Last Name
General Instructions 1. For each page, synthesize the reading and research by writing in complete sentences in essay format.
a. Use the green instructions in the notes below each page to focus your research and writing. b. Write about each question, prompt, or process provided in those notes. c. Write a full page of text with lots of detail (more than 250 words per page).
i. Don’t generalize so much that your writing is devoid of detail. ii. Don’t repeat yourself.
d. Cite each source by adding a hyperlink in the Title of the Article or law. e. Do not change the template:
i. Text must be 14 point Lato left-justified type. ii. Refrain from adding extra margins or double spacing.
iii. Do not bullet the paragraphs. Write in essay format only. f. Add additional pages if you need more room.
2. Add all sources to the Bibliography page. a. Include author, year, title, publisher, and URL. b. Number or bullet them using the list button.
When in doubt, write to the instructor for clarification using the Canvas Inbox.
http://people.oregonstate.edu/~vanlondp/cs391/articles/citations.html
https://canvas.oregonstate.edu/conversations
Company, position, and requirements 1. Pick a company where you would like to work. 2. Pick a position/job description that closely resembles the type of job you are seeking after graduation. 3. Note whether that job requires degrees, topic-specific exams, certification, adherence to codes of ethics, union membership, and practical
experience such as internships/apprenticeships. Cite all sources, especially the position description.
Software Dilemma 1. In the first paragraph, describe a single ethical or moral Software/Data problem (from the list below) that could occur in the position/job
you’ve chosen. Write in the first-person style in complete sentences. Cite research as needed to understand the problem. a. Machine Learning and Artificial Intelligence bias b. Crowdsourcing, cloud computing, and local Computing breach c. Blockchain fraud d. Computer fraud, computer crime, cyber attack, and cyber-terrorism e. White, gray, and black hat hacking f. Data Leaks, breaches, compromised web pages, outdated software, and browser hijacking
g. Ransomware, Spyware, Spear phishing, and Whaling h. Viruses, Trojans, Worms, and Fileless Malware i. Distributed Denial of Service (DDoS)
2. Note the related clause number and subheadline from the ACM Code of Ethics. For example 1.2 Avoid harm. 3. In the second paragraph, describe 3 actions you could take to solve the problem and/or prevent it from happening again.
a. To help you make decisions, refer to SCU’s Markkula Center for Applied Ethics Making Decisions flyer. b. Cite research as needed to support the prevention/solution.
https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.
https://www.scu.edu/media/ethics-center/resources/making.pdf
Hardware Dilemma 1. In the first paragraph, describe a single ethical or moral Hardware Manufacturing problem (from the list below) that could occur in the
position/job you’ve chosen. Write in the first-person style in complete sentences. Cite research as needed to understand the problem. a. Linear versus Circular Design b. Mining of raw materials and precious metals c. Radiofrequency and electromagnetic abuses d. Safety violations and poor working conditions e. Alien workforce f. Automation taking low-wage jobs
g. Electronic waste
2. Note the related clause number and subheadline from the ACM Code of Ethics. For example 1.2 Avoid harm. 3. In the second paragraph, describe 3 actions you could take to solve the problem and/or prevent it from happening again.
a. To help you make decisions, refer to SCU’s Markkula Center for Applied Ethics Making Decisions flyer. b. Cite research as needed to support the prevention/solution.
https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.
https://www.scu.edu/media/ethics-center/resources/making.pdf
Advertising, Search, or News Dilemma 1. In the first paragraph, describe a single ethical or moral Advertising, Search, or News problem (from the list below) that could occur in the
position/job you’ve chosen. Write in the first-person style in complete sentences. Cite research as needed to understand the problem. a. Fake News, ‘Informational Dominance’, and media bias b. Click Bait, Engagement Bait, Click Fraud Malware c. Endorsements and Testimonials d. Email advertising, Spam, and CAN-SPAM Act e. Search ads and Adwords f. Opt-in and Opt-out
g. Affiliate Marketing h. Truth in Advertising Laws i. Cyberpsychology j. Third-party data mining
k. Analytics and ‘behavior microtargeting’
2. Note the related clause number and subheadline from the ACM Code of Ethics. For example 1.2 Avoid harm. 3. In the second paragraph, describe 3 actions you could take to solve the problem and/or prevent it from happening again.
a. To help you make decisions, refer to SCU’s Markkula Center for Applied Ethics Making Decisions flyer. b. Cite research as needed to support the prevention/solution.
https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.
https://www.scu.edu/media/ethics-center/resources/making.pdf
Access, Equity, or Infrastructure Dilemma 1. In the first paragraph, describe a single ethical or moral Infrastructure Access problem (from the list below) that could occur in the
position/job you’ve chosen. Write in the first-person style in complete sentences. Cite research as needed to understand the problem. a. Communications services such as WiFi, Internet, electricity, satellite, and/or phone services b. Censorship c. Net neutrality d. Digital divide e. Mobile justice f. Algorithms biased against gender, race, age, class, ability, etc.
g. Excessive corporate profits and use of power h. Equal Opportunity Employer, Affirmative Action, or Americans with Disabilities Act accommodations (ADA) i. Fair Chance Ordinance, Veterans Preference, or E-Verify j. Pay Transparency Nondiscrimination Provision
k. Internship, Apprenticeship, and Unions
2. Note the related clause number and subheadline from the ACM Code of Ethics. For example 1.2 Avoid harm. 3. In the second paragraph, describe 3 actions you could take to solve the problem and/or prevent it from happening again.
a. To help you make decisions, refer to SCU’s Markkula Center for Applied Ethics Making Decisions flyer. b. Cite research as needed to support the prevention/solution.
https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.
https://www.scu.edu/media/ethics-center/resources/making.pdf
Intellectual property, abuse, and privacy laws 1. In the first paragraph, describe a single ethical or moral Intellectual Property or Privacy problem (from the list below) that could occur in
the position/job you’ve chosen. Write in the first-person style in complete sentences. Cite research as needed to understand the problem. a. Patents b. Trademarks c. Copyrights d. Plagiarism e. Educational privacy (FERPA) f. Medical privacy (HIPAA)
g. Business privacy (ECPA) h. Finance privacy (Gramm-Leach-Bliley Act) i. The Privacy Act of 1974, search and seizure, third-party data rights j. PATRIOT Act
k. Computer Fraud And Abuse Act
2. Note the related clause number and subheadline from the ACM Code of Ethics. For example 1.2 Avoid harm. 3. In the second paragraph, describe 3 actions you could take to solve the problem and/or prevent it from happening again.
a. To help you make decisions, refer to SCU’s Markkula Center for Applied Ethics Making Decisions flyer. b. Cite research as needed to support the prevention/solution.
https://www.acm.org/code-of-ethics#h-1.2-avoid-harm.
https://www.scu.edu/media/ethics-center/resources/making.pdf
Whistleblowing 1. Which dilemma from the previous pages would require you to blow the whistle on a coworker, boss, or the company? 2. Which agency listed below would you use to start the whistleblowing process and what might the consequences be? (Cite the source.)
○ Americans with Disabilities Act (ADA) Complaint ○ Antitrust Violation (FTC) reporting ○ Association for Computing Machinery (ACM) Enforcement Procedures ○ Equal Employment Opportunity Commission (EEOC) File a Charge of Discrimination ○ Federal Bureau of Investigation (FBI) Scams and Crimes reporting ○ Federal Communications Commission (FCC) Consumer Complaint Center. ○ Computer Emergency Readiness Team (US-CERT) Report Incidents, Phishing, Malware, or Vulnerabilities. ○ Electronic Communications Privacy Act (ECPA) Reporting ○ Family Educational Rights and Privacy Act (FERPA) File a Complaint ○ Health Insurance Portability and Accountability Act (HIPAA) Filing a Complaint ○ Institute of Electrical and Electronics Engineers (IEEE) Legal and Compliance ○ Justice Department Reporting Computer, Internet-related, or Intellectual Property Crime ○ Occupational Safety and Health Administration (OSHA) File a Health and Safety Complaint (OSHA) ○ Whistleblower Protection Programs (USA)
https://www.ada.gov/filing_complaint.htm
https://www.ftc.gov/faq/competition/report-antitrust-violation
https://www.acm.org/code-of-ethics/enforcement-procedures
https://www.eeoc.gov/filing-charge-discrimination
https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/
https://consumercomplaints.fcc.gov/hc/en-us
https://www.us-cert.gov/report
https://epic.org/privacy/ecpa/#resources
https://studentprivacy.ed.gov/file-a-complaint
https://www.hhs.gov/hipaa/filing-a-complaint/index.html
https://www.ieee.org/about/corporate/compliance/legal/index.html
https://www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-property-crime
https://www.osha.gov/workers/file_complaint.html
https://www.whistleblowers.gov/
Ethical theory/approach governing my decision making Which workable ethical theory or approach governs most of your moral decision making for the majority of the 5 dilemmas, and why? Cite the source of the definition of the theory/approach you chose.
● Act or Rule Utilitarianism, or the Utilitarian Approach ● Kantianism ● Virtue Ethics or the Virtue Approach ● Social Contract theory (Contractarianism) ● The Rights Approach ● The Fairness or Justice Approach ● The Common Good Approach
Bibliography
● List each of the sources you wrote about. Include these data in each line item: ● Author name. Year of publication. Title of article. Publisher. URL of the article online