Chat with us, powered by LiveChat Steps in Ethical Case Analysis | Wridemy

Steps in Ethical Case Analysis

 Paper 3 involves both a paper and PowerPoint assignment. Using the given paper, add to the assignment using the given rubric. And then create a powerpoint. Read files for more context. 

3rd Case Study assignment

Pick a case or subject from the list of case studies I have sent you.

Steps in Ethical Case Analysis

1. Get the facts straight. Review the case. Briefly recap the details of the case at the beginning of your paper.

2. Identify the central stakeholders in the case. Identify 6 stakeholders then narrow your analysis down to 3.

3. Identify the technical/professional problem in the case.

4. Identify the Ethical problem or problems in the case.

5. Solve the technical and ethical problems using both technical and Ethical standards. Analyze the case from 3 perspectives, 1st use standard ethical principles and use 1 ethical principle for each perspective. 2nd, In Addition you must now also apply 3 principles from the ACM code of ethics in your analysis. 1 principle should be applied for each of the 3 stakeholder perspectives you analyze. 1 principle should be applied for each of the 3 stakeholder perspectives you analyze. 3rd you need to apply 3 of the 5 rules for computing artifacts. This should be an Anticipatory Ethical analysis. 1 rule should be applied for each of the 3 stakeholder perspectives you picked in step 2. The 5 rules are located in a file in Blackboard.

6. Will your solution to the problem withstand criticism from the perspectives of both a variety of Ethical principles and Professionals in your field?

7. What recommendations can you make about the problems in the case based upon your ethical analysis?

When you construct your analysis be sure and remember that we are assigning a 4-6 page analysis. With this length limitation it is important to realize that you will probably only be able to look at the problems in the case from three stakeholder perspectives. If you try to analyze every stakeholder perspective you will probably exceed the length limitation.

Grading and Evaluation of Individual Papers

1. What are the objectives of the papers?

A.

i. To become sensitized to the ethical issues in Engineering and Information Technology.

ii. Learn how to analyze a case.

iii. Learn how to identify the major stakeholders in a case.

iv. Learn how to identify the technical problems in a case.

v. Learn how to identify the ethical problems in a case.

vi. Learn how to apply ethical principles to a case.

vii. Learn how to make recommendations in a case based upon ethical analysis.

B.

a. Critical thinking

i. Did you identify and focus on the crucial material and facts in the case?

ii. Did you support claims you make about the case with facts?

iii. Did you think about the case from a variety of stakeholder perspectives?

b. Ethical analysis

i. Did you identify the central Ethical problem(s)

ii. Did you conduct a well thought out ethical analysis by applying 3 ethical principles?

iii. Did you justify ethical judgments with accurate facts and ethical principles?

iv. Did you think about the case from a variety of ethical perspectives?

v. Did you base your analysis upon ethical principles that cannot be easily criticized?

How will your papers be assessed?

Evaluations of Papers (Percentages)

A. The Case Recap (.10)

i. Do you highlight the key points in the case?

a. Are the facts in the case accurate?

b. Did you focus on the crucial aspects of the case?

c. Did you avoid including non essential or superfluous information?

B. Stakeholders (.10)

i. Who are the primary and secondary stakeholders in the case?

ii. Did you clearly identify from which stakeholder perspective you are analyzing the material in the case?

a. From whose perspective are you analyzing the case?

C. What is the central technical problem? (.15)

i.. How is the central technical problem related to the ethical problems in the case?

D. What is/are the ethical problem/problems? (.15)

i. What ethical problems do you see in the case?

ii. What is the central ethical problem?

iii. Why is this the central ethical problem?

E. What ethical principles apply to the central ethical problem? (.10)

i. Do you correctly define the ethical principles you use?

ii. Have you correctly applied the ethical principles you use?

iii. Do the principles you use withstand obvious criticisms from other ethical perspectives?

F. What principles from the ACM code of ethics apply to the central ethical problem? (.10)

i. Do you correctly define the ethical principles you use?

ii. Have you correctly applied the ethical principles you use?

iii. Do the principles you use withstand obvious criticisms from other ethical perspectives?

.

G. What rules from The 5 Rules apply to the central ethical problem? (.10)

i. Do you correctly define the ethical principles you use?

ii. Have you correctly applied the ethical principles you use?

iii. Do the principles you use withstand obvious criticisms from other ethical perspectives?

H. What are your recommendations? (.20)

i. Are your recommendations based upon your ethical analysis?

ii. Do your recommendations link to your ethical analysis?

iii. Rather than stating the obvious ( e. g. this problem could have been easily solved if … ) what do you recommend for similar cases in the future?

,

2

SCENARIO 6-1: The "Olympic Games" Operation and the Stuxnet Worm

Kehinde Osunniran

Towson University

COSC 418

Professor Wilson

SCENARIO 6-1: The "Olympic Games" Operation and the Stuxnet Worm

The case discusses joint operation between the United States and Israel, codenamed Olympic Games, aimed at disrupting Iran's uranium enrichment program in 2006. The operation utilized a computer worm known as Stuxnet targeting industrial-controlled computers (ICCs) developed by Siemens Corporation and installed in Iran . The Stuxnet worm allegedly sent misleading data to computer monitors in Iran and caused centrifuges used for uranium enrichment to spin out of control . Approximately 1,000 centrifuges were destroyed, significantly impacting Iran's nuclear capabilities. Questions arose about whether Olympic Games' operation was justified breach of cybersecurity, whether it is wrong for sovereign nation-states to engage in such cyber intrusions, or if exceptions can be made for cyberwarfare. The absence of a formal declaration of war among the nations involved raises the question of whether imminent threats, like development of nuclear weapons by "rogue" nations, can justify cyber intrusions.

The central stakeholders in the case were the United States and Israel, who planned and executed the operation. Iran, the target nation, Siemens Corporation, the manufacturer of the targeted Industrial Control Computers (ICCs). The international community represented the global perspective and norms regarding cyber intrusions. Non-state hacking groups, like Anonymous, intervened against ISIS, and the general public was affected by these cyber intrusions' consequences. The analysis will focus on the United States government, the Israeli government, and the Iranian government. These three stakeholders were directly involved in the operation, and their actions and perspectives are central to ethical considerations surrounding cyber intrusions used to achieve national security objectives.

The technical/professional problem in the given case is developing and deploying the Stuxnet worm as part of the Olympic Games operation. The Stuxnet worm was designed to target industrial control computers (ICCs) developed by Siemens Corporation and installed in Iran's uranium enrichment facilities. The problem lies in the potential misuse or unintended consequences arising from such powerful tool.

The ethical problems surrounding cyber intrusions by sovereign nation-states, non-state actors, and the legitimacy of targeted entities are complex and require careful consideration. Sovereign nation cyber intrusions raise concerns about the moral permissibility of breaching cybersecurity without formal declaration of war is contentious. Non-state actors launching cyberattacks raise questions about the moral boundaries of individual or group actions in cyberspace. The non-recognition of rogue nations or unofficial states as legitimate entities can justify cyber intrusions but raise concerns about accountability, proportionality, and escalation.

To solve the case, we first consider from the perspective of sovereign nation-states. The utilitarian principle of pursuing the greater good for the greatest number can be invoked to justify their actions. Disrupting Iran's nuclear capability in light of potential "rogue" nations' threats could be seen as a consequentialist approach aimed at preventing harm on a larger scale. However, ethical principle of respect for privacy outlined in the ACM Code of Ethics should be considered. The Olympic Games operation breached and disrupted computer systems compromising privacy rights. Sovereign nation-states must consider the potential consequences and long-term effects of their actions. Their interventions should not undermine fundamental rights and escalate conflicts. Proportionality and necessity of cyber intrusions should first be carefully evaluated, especially when no formal declaration of war exists.

Next, we can consider the perspective of non-state actors from a deontological standpoint. The principle of respect for autonomy can be applied, emphasizing the importance of individual agency and decision-making. State-sponsored cyber intrusions can be justified on consequentialist grounds, but non-state actors’ actions, like Anonymous hacker groups, require evaluation (Wilson, n.d.). The ACM Code of Ethics principle of professional competence should be considered. Non-state actors may lack the necessary expertise and accountability mechanisms in legitimate state actions (Housen-Couriel, 2021). Although driven by desire to achieve a greater good, their actions may inadvertently cause unintended harm or escalate conflicts. Therefore, it is crucial to consider the potential risks and unintended consequences of legitimizing non-state actors' activities as they do not act officially on behalf of recognized nation-states.

Last, we can consider perspective of general public guided by ethical principle of respect for human rights. The public has the right to be protected from the potential negative consequences of cyber intrusions, regardless of whether carried out by state actors or non-state actors (Jørgensen, 2019). However, such actions by sovereign nation-states raise concerns regarding privacy, security, and potential collateral damage. The ACM Code of Ethics emphasizes the importance of public understanding and support, indicating the need for transparency and accountability in cyber operations. Olympic Games incident had no formal declaration of war among involved nations, and the actions were unjustifiable public expectations and support. Granting nonstate actors the same justifications could lead to chaotic and unpredictable cyber landscape, compromising global security and stability. Therefore, potential risks and ethical implications associated with unauthorized cyberattacks must be carefully weighed against the principles of human rights, public welfare, and international norms.

The solution provided considers multiple ethical principles and professional standards. It aims to balance the utilitarian perspective of achieving the greater good and the deontological perspective of respecting individual rights and autonomy. Incorporating the ACM Code of Ethics ensures the analysis incorporates professional standards in cybersecurity field.

Based on the ethical analysis, I recommend developing international cybersecurity norms, strengthening diplomatic channels, enhancing professional education and certification in cybersecurity, and fostering public awareness and engagement in cybersecurity. The norms should prioritize transparency, accountability, and respect for human rights and establish common framework for addressing cyber intrusions. Enhancing professional education can equip professionals with the necessary knowledge and ethical awareness (Formosa et al., 2021). Promoting diplomatic efforts to resolve conflicts can reduce cyber intrusions needed as means of addressing potential threats.

References

Formosa, P., Wilson, M., & Richards, D. (2021). A principlist framework for cybersecurity ethics. Computers & Security, 109, 102382. https://doi.org/10.1016/j.cose.2021.102382

Housen-Couriel, D. (2021). Hacking Back under International Law: Toward Effective Remedies against Cyberattacks for Non-State Actors. 103–133. https://doi.org/10.1142/9789811219160_0005

Jørgensen, R. F. (2019). Human rights in the age of platforms. The Mit Press.

Wilson, R. L. (n.d.). Application of Ethical Principles.

,

ACM Code of Ethics and Professional Conduct

Preamble

Computing professionals' actions change the world. To act responsibly, they should reflect upon

the wider impacts of their work, consistently supporting the public good. The ACM Code of

Ethics and Professional Conduct ("the Code") expresses the conscience of the profession.

The Code is designed to inspire and guide the ethical conduct of all computing professionals,

including current and aspiring practitioners, instructors, students, influencers, and anyone who

uses computing technology in an impactful way. Additionally, the Code serves as a basis for

remediation when violations occur. The Code includes principles formulated as statements of

responsibility, based on the understanding that the public good is always the primary

consideration. Each principle is supplemented by guidelines, which provide explanations to

assist computing professionals in understanding and applying the principle.

Section 1 outlines fundamental ethical principles that form the basis for the remainder of the

Code. Section 2 addresses additional, more specific considerations of professional

responsibility. Section 3 guides individuals who have a leadership role, whether in the workplace

or in a volunteer professional capacity. Commitment to ethical conduct is required of every ACM

member, and principles involving compliance with the Code are given in Section 4.

The Code as a whole is concerned with how fundamental ethical principles apply to a computing

professional's conduct. The Code is not an algorithm for solving ethical problems; rather it

serves as a basis for ethical decision-making. When thinking through a particular issue, a

computing professional may find that multiple principles should be taken into account, and that

different principles will have different relevance to the issue. Questions related to these kinds of

issues can best be answered by thoughtful consideration of the fundamental ethical principles,

understanding that the public good is the paramount consideration. The entire computing

profession benefits when the ethical decision-making process is accountable to and transparent

to all stakeholders. Open discussions about ethical issues promote this accountability and

transparency.

1. GENERAL ETHICAL PRINCIPLES.

A computing professional should…

1.1 Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing.

This principle, which concerns the quality of life of all people, affirms an obligation of computing

professionals, both individually and collectively, to use their skills for the benefit of society, its

members, and the environment surrounding them. This obligation includes promoting

fundamental human rights and protecting each individual's right to autonomy. An essential aim

of computing professionals is to minimize negative consequences of computing, including

threats to health, safety, personal security, and privacy. When the interests of multiple groups

conflict, the needs of those less advantaged should be given increased attention and priority.

Computing professionals should consider whether the results of their efforts will respect

diversity, will be used in socially responsible ways, will meet social needs, and will be broadly

accessible. They are encouraged to actively contribute to society by engaging in pro bono or

volunteer work that benefits the public good.

In addition to a safe social environment, human well-being requires a safe natural environment.

Therefore, computing professionals should promote environmental sustainability both locally

and globally.

1.2 Avoid harm.

In this document, "harm" means negative consequences, especially when those consequences

are significant and unjust. Examples of harm include unjustified physical or mental injury,

unjustified destruction or disclosure of information, and unjustified damage to property,

reputation, and the environment. This list is not exhaustive.

Well-intended actions, including those that accomplish assigned duties, may lead to harm.

When that harm is unintended, those responsible are obliged to undo or mitigate the harm as

much as possible. Avoiding harm begins with careful consideration of potential impacts on all

those affected by decisions. When harm is an intentional part of the system, those responsible

are obligated to ensure that the harm is ethically justified. In either case, ensure that all harm is

minimized.

To minimize the possibility of indirectly or unintentionally harming others, computing

professionals should follow generally accepted best practices unless there is a compelling

ethical reason to do otherwise. Additionally, the consequences of data aggregation and

emergent properties of systems should be carefully analyzed. Those involved with pervasive or

infrastructure systems should also consider Principle 3.7.

A computing professional has an additional obligation to report any signs of system risks that

might result in harm. If leaders do not act to curtail or mitigate such risks, it may be necessary to

"blow the whistle" to reduce potential harm. However, capricious or misguided reporting of risks

can itself be harmful. Before reporting risks, a computing professional should carefully assess

relevant aspects of the situation.

1.3 Be honest and trustworthy.

Honesty is an essential component of trustworthiness. A computing professional should be

transparent and provide full disclosure of all pertinent system capabilities, limitations, and

potential problems to the appropriate parties. Making deliberately false or misleading claims,

fabricating or falsifying data, offering or accepting bribes, and other dishonest conduct are

violations of the Code.

Computing professionals should be honest about their qualifications, and about any limitations

in their competence to complete a task. Computing professionals should be forthright about any

circumstances that might lead to either real or perceived conflicts of interest or otherwise tend to

undermine the independence of their judgment. Furthermore, commitments should be honored.

Computing professionals should not misrepresent an organization's policies or procedures, and

should not speak on behalf of an organization unless authorized to do so.

1.4 Be fair and take action not to discriminate.

The values of equality, tolerance, respect for others, and justice govern this principle. Fairness

requires that even careful decision processes provide some avenue for redress of grievances.

Computing professionals should foster fair participation of all people, including those of

underrepresented groups. Prejudicial discrimination on the basis of age, color, disability,

ethnicity, family status, gender identity, labor union membership, military status, nationality,

race, religion or belief, sex, sexual orientation, or any other inappropriate factor is an explicit

violation of the Code. Harassment, including sexual harassment, bullying, and other abuses of

power and authority, is a form of discrimination that, amongst other harms, limits fair access to

the virtual and physical spaces where such harassment takes place.

The use of information and technology may cause new, or enhance existing, inequities.

Technologies and practices should be as inclusive and accessible as possible and computing

professionals should take action to avoid creating systems or technologies that disenfranchise

or oppress people. Failure to design for inclusiveness and accessibility may constitute unfair

discrimination.

1.5 Respect the work required to produce new ideas, inventions, creative works, and computing artifacts.

Developing new ideas, inventions, creative works, and computing artifacts creates value for

society, and those who expend this effort should expect to gain value from their work.

Computing professionals should therefore credit the creators of ideas, inventions, work, and

artifacts, and respect copyrights, patents, trade secrets, license agreements, and other methods

of protecting authors' works.

Both custom and the law recognize that some exceptions to a creator's control of a work are

necessary for the public good. Computing professionals should not unduly oppose reasonable

uses of their intellectual works. Efforts to help others by contributing time and energy to projects

that help society illustrate a positive aspect of this principle. Such efforts include free and open

source software and work put into the public domain. Computing professionals should not claim

private ownership of work that they or others have shared as public resources.

1.6 Respect privacy.

The responsibility of respecting privacy applies to computing professionals in a particularly

profound way. Technology enables the collection, monitoring, and exchange of personal

information quickly, inexpensively, and often without the knowledge of the people affected.

Therefore, a computing professional should become conversant in the various definitions and

forms of privacy and should understand the rights and responsibilities associated with the

collection and use of personal information.

Computing professionals should only use personal information for legitimate ends and without

violating the rights of individuals and groups. This requires taking precautions to prevent re-

identification of anonymized data or unauthorized data collection, ensuring the accuracy of data,

understanding the provenance of the data, and protecting it from unauthorized access and

accidental disclosure. Computing professionals should establish transparent policies and

procedures that allow individuals to understand what data is being collected and how it is being

used, to give informed consent for automatic data collection, and to review, obtain, correct

inaccuracies in, and delete their personal data.

Only the minimum amount of personal information necessary should be collected in a system.

The retention and disposal periods for that information should be clearly defined, enforced, and

communicated to data subjects. Personal information gathered for a specific purpose should not

be used for other purposes without the person's consent. Merged data collections can

compromise privacy features present in the original collections. Therefore, computing

professionals should take special care for privacy when merging data collections.

1.7 Honor confidentiality.

Computing professionals are often entrusted with confidential information such as trade secrets,

client data, nonpublic business strategies, financial information, research data, pre-publication

scholarly articles, and patent applications. Computing professionals should protect

confidentiality except in cases where it is evidence of the violation of law, of organizational

regulations, or of the Code. In these cases, the nature or contents of that information should not

be disclosed except to appropriate authorities. A computing professional should consider

thoughtfully whether such disclosures are consistent with the Code.

2. PROFESSIONAL RESPONSIBILITIES.

A computing professional should…

2.1 Strive to achieve high quality in both the processes and products of professional work.

Computing professionals should insist on and support high quality work from themselves and

from colleagues. The dignity of employers, employees, colleagues, clients, users, and anyone

else affected either directly or indirectly by the work should be respected throughout the

process. Computing professionals should respect the right of those involved to transparent

communication about the project. Professionals should be cognizant of any serious negative

consequences affecting any stakeholder that may result from poor quality work and should

resist inducements to neglect this responsibility.

2.2 Maintain high standards of professional competence, conduct, and ethical practice.

High quality computing depends on individuals and teams who take personal and group

responsibility for acquiring and maintaining professional competence. Professional competence

starts with technical knowledge and with awareness of the social context in which their work

may be deployed. Professional competence also requires skill in communication, in reflective

analysis, and in recognizing and navigating ethical challenges. Upgrading skills should be an

ongoing process and might include independent study, attending conferences or seminars, and

other informal or formal education. Professional organizations and employers should encourage

and facilitate these activities.

2.3 Know and respect existing rules pertaining to professional work.

"Rules" here include local, regional, national, and international laws and regulations, as well as

any policies and procedures of the organizations to which the professional belongs. Computing

professionals must abide by these rules unless the

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Wridemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order

Related Tags

Academic APA Writing College Course Discussion Management English Finance General Graduate History Information Justify Literature MLA