Ethics

 

This is the first of a series of five assignments focusing on software engineering ethics.

Read the attached Ethics-1.pdf  Download Ethics-1.pdf document explains what Ethics mean when we talk about it in the context of software engineering. Complete the reading and then proceed to the two case studies in the Part One of the focusing area: The types of harms the public can suffer as result of software engineers’ work and the harms they can prevent.

Based on the two case studies, you will answer 6 questions in this reading. Because for many ethics questions there is no absolutely right or wrong answers as such, your responses will be graded based on completeness and thoughtfulness as opposed to rote or perfunctory ones.

There are three grade levels for this assignment based on your responses to all six questions: 20 (no reasoning in responses), 35 (minimal to little reasoning), and 50 (sufficient reasoning and consideration).

Write your answers in a Word file using Times New Roman font (no smaller than 10 pt but no bigger than 12 pt), single spacing, 1″ margins on all sides.

 Question 1.1: What kinds of harm has Mike probably suffered as a result of this incident? What kinds of harm has Sarah probably suffered? (Make your answers as full as possible; identify as many kinds of harm done as you can think of). 

Question 1.2: Could the problem with Mike’s account have been the result of an action (or a failure to perform an action) by a software engineer? How many possible scenarios/explanations for this event can you think of that involve the conduct of one or more software engineers? Briefly explain the scenarios:

 Question 1.3: Taking into account what we said about ethics in the introduction, could any of the scenarios you imagined involve an ethical failure of the engineer(s) responsible? How? Explain: *Note: An ethical failure would be preventable, and one that a good human being with appropriate professional care and concern would and should have prevented (or at least have made a serious effort to prevent) 

 Question 1.4: In what ways could Karen potentially be harmed by this app, depending on how it is designed and how her shopping data is handled and used? Identify a few harmful scenarios you can think of, and the types of harm she could suffer in each: 

Question 1.5: Which if any of these harms could result from ethical failings on the part of the people who developed Errand Whiz? How, specifically? 

Question 1.6: What actions could the people behind Errand Whiz take to prevent these harms? Are they ethically obligated to prevent them? Why or why not? Explain your answer. 

R assignment

 Review The Power of Good Design and   select three of the ten principles noted for good design. Next in R,   utilize these three principles in a problem that you will solve. First   note the problem to solve, the dataset (where the information was  pulled  from), and what methods you are going to take to solve the  problem.   Ensure the problem is simple enough to complete within a  two-page  document. For example, I need to purchase a house and want to  know what  my options are given x amount of dollars and x location based  on a  sample of data from Zillow within each location. 
Ensure there is data visualization in the homework and note how it relates to the three principles selected. 

The link for The Power of Good Design:

https://www.vitsoe.com/gb/about/good-design

about the recent alert

 

Choose an Alert closely related to the weekly topic and write a concise summary using the template.

Assignment Directions: 

  1.  The US Government Cybersecurity & Infrastructure Security Agency (CISA) provides timely notification to critical infrastructure owners and operators concerning threats to critical infrastructure networks. Each week, review the National Cyber Awareness System website.   
  2.  Choose a topic closely related to our weekly material and write a concise summary using the organizational template and example

Predictive Model

Instructions:

You learned about data collection, and specifically how to establish clinical prediction models. 

For this activity, you will take a closer look at data collection and the development of predictive models. Answer the information below.

Select a predictive model used in healthcare.

  1. What predictive model did you select?
  2. What data was collected to drive the development of the existing predictive model?
  3. What data source did you use?

Cyberstalking

Answer below questions.

  

1. Conduct an internet or library search on cyberstalking. Read one or two articles that you find most interesting. Document the article(s) that you reviewed.

2. Using your search engine of choice, look up the Federal Interstate Stalking and Prevention Act at 18 U.S. Code, section 2261A.List three to five behaviors that may constitute cyberstalking.

3. Describe how the Interstate Stalking and Prevention Act attempts to address cyberstalking.

4. Based on what you have read about cyberstalking, do you think that this law is sufficient to deter cyberstalkers? Why or why not?

5. Conduct an internet or library search on cyberbullying. Read one or two articles that you find most interesting. Document the article(s) that you reviewed.

6. Research your state’s cyberbullying laws.

7. Conduct an internet or library search on cyberbullying. Read one or two articles that you find most interesting.Document the article(s) that you reviewed.

8. Research your state’s cyberbullying laws.What is the citation for your state’s cyberbullying law?

9. What is the prohibited behavior?

10. What are the procedures for reporting cyberbullying?

11. What are the consequences for the perpetrator?

12. What are the safeguards for the victim (if any)?

13. Using your research, write one paragraph describing whether you think your state’s cyberbullying law is sufficient to prevent cyberbullying. Why or why not?

14. The director of human resources at Astounding Appliances is updating the company’s antiharassment policy for the employee handbook. She asks you to help her write a paragraph or two outlining what cyberstalking is, including a definition and examples of prohibited behaviors. She asks you to specifically include examples of prohibited behavior that could happen in the work environment using company-provided computing devices. Prepare the materials that the director of human resources asks for. As you complete the exercise, are there any other recommendations that you might make to the director of human resources regarding actions to take in response to cyberbullying activities that take place using company-provided computing devices?

C++ Advanced Programming

Hi, I need this C++ Advanced assignment written in Visual Studio by tonight. I am really busy this week and can’t finish it in time. Word document instructions along with the Rubric are attached. Please no plagiarism and include all the files necessary. Thank you!