1)Ethical Frameworks Answer all question approximately 1 to

1)Ethical Frameworks Answer all question approximately 1 to

1)Ethical Frameworks
Answer all question approximately 1 to 2 paragraphs.
Case study
In your spare time at work, you have developed a new spreadsheet program on the personal computer in your office. It is even more powerful, yet easier to sue than anything on the market. You share your new program with a friend who encourages you to market it on your own because you could probably make an incredible profit in a very short time. This is a very attractive option, yet you developed it using company equipment and during time that you were at work.
Ethical question: Do you inform the company of what you have developed?
Q1)Apply the consequence based ( utilitarian ) ethical theory to this case and provide an answer to the ethical question raised ?
Q2)Apply the duty-based (deontology) ethical theory to this case and provide an answer to the ethical question raised?
Q3) Apply the contract-based (rights ) ethical theory to this case and provide an answer to the ethical question raised ?
Q4) Apply the character-based (virtue) ethical theory to this case and provide an answer to the ethical question raised?
Q5) Assuming that you are a member of the Australian computer society (ACS), choose one (1) element of the ACS’s code of ethics that you think is relevant to this case. Explain why you think it’s relevant.
(B)Social implication
Answer all question approximately 2 to 3 paragraphs.
B1) discuss the ways in which the concept of intellectual property (IP) differs from the traditional view of property. Name four ways in which IP has been legally protected. Choose one of them and describe how it can be applied to protect IP.
B2)
“wiretapping” is the monitoring of electronic communication such as telephones and computers. It is a highly controversial practice and its legality of often challenged. Describe ways in which wiretapping may be considered acceptable in the interests of the wider society. Describe ways in which it may be considered unacceptable.
B3)
Explain the differences between cybercrime and cyber-related crime and give an example of each.
What is malware? Give three examples of types of malware and describe them.
B4)
What are on-line communities and how do the compare to traditional comminutes? How is our understanding of place, time and space affected by on-line communities?
Social media has led to some disturbing trends. Describe some of the negative aspects of social media.
(c)Professional skills
Answer all question approximately 2 to 3 paragraphs.
C1)
Discuss the development of a resume. What steps would you take to ensure that your resume gives you the best possible chance of being employed? if you were a recruiter what aspect of a resume might lead you to view it negatively and not perhaps consider it further?
C2)
To help meet a deadline on a software development project , a project manager often worked back late after the rest of the team had gone home. On one such evening the project manager was working on a task that required certain data that he could not find . He knew that one of his team members had sent the data to another team member a few days before. The project manager knew the first team member’s password because he had watched her type it in on occasions. He logged in using the first team members password and retrieved the data from her email . However, he noticed some other emails, which he found personally offensive. While he could not openly confront the team member with this knowledge without revealing how he had gotten access to it, his attitude towards the team member became hostile. He openly criticised her. Give her the least appealing tasks and eventually forced her to leave.
a) what were the key facts in this situation?
Apply the PMI’s code of ethics (responsibility, respect, fairness, and honesty) to assist you in answering each of the following question in relation to the situation:
b) Discuss whether the actions of the project manager were in the best interests of the company.
c) Discuss whether the actions of the project manager were unethical.
C3)
Project management has begun to play an increasingly important role in organizations. IT projects are identified to continuously improve the existing business performance and project for the future per organizational strategy. Unfortunately, many IT project fail.
How can approaching projects with management, leadership and entrepreneurial mindsets improve the success rate of projects?
C4)
Leaders in the workplace might find the staff will sometimes resist change. What are some reasons (at least three) that staff might resist change? What techniques might be employed to help overcome this resistance?

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper