Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted.
• Choose one of the media articles or case studies listed by the lecturer in your Interact 2 subject site.
• Use the title of the article/case study provided in interact 2 as the title of your essay, so that the lecturer knows which article you are analysing.
• Undertake further research about your chosen case, to assist you in analysing and discussing it in your essay.
You are required to complete the following:
Write an essay:
• The word limit for the essay is 1,000 words ± 10%. Headings, citations and references do not count towards the word limit, but quotations do.
• Analyze the article/case study from the perspective of at least two different classical ethical theories, one of which must be that of "Just Consequentialism". Present well reasoned arguments for your assessments and recommendations.
• Write an overall conclusion that justifies your recommendations made in your essay.
• Include a Reference list at the end of your work, in the correct APA referencing style, corresponding to in-text citations.
This assessment extends the skills practiced in Assessment item 1 and 2, to help you to achieve all the learning objectives.
In addition to identifying a contentious situation in ICT and dissecting the argument(s) about it, you must also now demonstrate the ability to evaluate the elements of the argument by introducing classical ethical principles where appropriate.
Since Assessment item 1 and 2, your knowledge will have grown, and you will now realise that almost all ICT ethical dilemmas can be classified under one of the main ICT ethical issues that are discussed in this subject; for instance, surveillance is a sub-issue of privacy, harmful software is a sub-issue of ICT professionalism, and piracy is a sub-issue of intellectual property.
In ICT, the main ethical issues are taken to be:
• ICT professionalism
• Intellectual property
• Regulation on the internet
• Social inclusion
• Community and identity
• Pervasive and convergent computing.
The assessment item is designed to help you to build skills towards achieving the learning objectives, by requiring you to:
• Identify an ICT-related ethical issue from a media article or case study;
• Apply classical ethical theory to the analysis of an ethically questionable situation to determine the rightness or wrongness of actions/decisions made therein;
• Derive logical and justifiable conclusions to resolve the ethical issue(s);and,
• Apply proper academic referencing.
To complete this assignment, first you need to choose an article (if you have not done yet) from the following links:
Step 1. Construct a diagram to map the arguments
You must understand about how to make logical arguments, please read chapter 3 form textbook and teaching materials provided in week 6 (topic 6. Critical thinking and logical arguments) especially section about Philosophical analysis of the case using Rationale on page 242 from the journal article provided with titled: “Improving skill development: an exploratory study comparing a philosophical and an applied ethical analysis technique”
You can use the following rationale online editor or any other software to construct a diagram with three different colour boxes and lines:
First you think about all possible logical arguments about your chosen case study. For example, the following are few possible logical arguments about the example provided in assignment 3 resources folder, entitled: “Foreign & local government surveillance creates privacy issues”. Why it is ethically wrong to collect Meta data.
Now you need to work on to differentiate all arguments in support (because)-green colour, oppose (but)-red colour and objection to an objection (however)-orange colour.
Green box: because-Information is stored for long periods of time and is accessible by many people
Red box: but-Google collections` data from unsecured wi-fi networks was not intentional
Orange box: however-Google differentiated between encrypted and unencrypted content
Should you prefer an aleternative method of marking your arguments/objections/data - make sure you discuss it with your lecturer before commencing the assignment.