Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Here are some issues that you may have noticed in the news, each of which involv

ID: 3918540 • Letter: H

Question


Here are some issues that you may have noticed in the news, each of which involves the intertwining of technology and human values:
Personal privacy when surfing the Web Software quality issues: How good is
good enough? Licensing of software engineers The digital divide: The haves and have-nots
of information U.S. Supreme Court ruling on virtual kiddie
pornogrophy U.S. Supreme Court ruling on filters in public
library Internet use U.S. Supreme Court ruling that children have
the right to buy violent games Tracking terrorist and hate group Web sites Censoring information on the Web about
making bombs Loss of jobs due to technology Computer algorithms for determining the risks
of subprime mortgages Virtual reality as recreation Computer simulations in the courtroom E-mail spam and legislation to stop it Online education and cheating Surveillance cameras in public areas Face recognition to scan for terrorists at the
Super Bowl FBI databases of criminals Web sites with convicted sex offenders’
addresses Stolen credit card numbers posted on
the Internet
Sales taxes on Internet sales Computing for the disabled Open source software versus commercial
software Remixing pictures or videos found on the Web
to create art Term papers for sale on the Internet Internet-based plagiarism detection services States selling information compiled from
drivers’ licenses Database matching to find deadbeat parents Internet casino gambling Workplace monitoring using computers Legal rights for robots Smart bombs and other lethal robots Artificial intelligence devices for medical
diagnosis DNA evidence in capital cases The increasing influence of Anonymous,
LulzSec, and other hacker groups WikiLeaks’ publication of secret U.S.
diplomatic cables The e-mail of public figures, like Sarah Palin
and Elena Kagan, being published Politicians’ Twitter- and/or Craigslist-related
“sex” scandals
a. Practice creating analogies—Pick three topics from the list shown here, or make up some topics of your own that involve technology and humans. For each topic, think of an analogous situation that does not involve computing. For example, if you picked “online education and cheating,” an obvious analogy would be to consider
face-to-face education and cheating. If you picked “personal privacy when surfing the Web,” an analogy might be “personal privacy when checking out library books.” When you’ve picked your three topics and your analogy for each, make a short list of how each analogy is like the topic and how the analogy is different from the topic.
b. Practice finding stakeholders—Pick your favorite topic from among the three topics you chose in Exercise 1a. For that topic, make a new list of all the significant stakeholders in the topic. (Hint: Remember that a stakeholder can be an individual, a group of individuals, a corporation, perhaps the environment, or any other entities you think are important in your topic.) For each stakeholder, list what the stakeholder most values in this situation.
It might help you to frame a specific question or propose a particular action related to the topic. For example, if your topic is “online education and cheating,” you might propose the action, “online education should be suspended until online cheating can be better controlled” or “online education should include automated cheating detection.” This narrowing of the topic sometimes simplifies the task of imagining what people value with respect to this issue.
c. Practice identifying costs and benefits—For each stakeholder you identified in Exercise 1b, list the possible costs and benefits in the situation you chose. In many cases, these are potential costs and benefits, things that might or might not happen. Sometimes the words vulnerability and opportunity can be more accurate than cost and benefit because of uncertainties in the situation.
2.
d. Practice looking for duties and responsibilities— In the previous two parts, you identified some stakeholders. Let’s use the letter N to stand for the number of stakeholders you identified. Now, make a two-dimensional table that has N × N cells. At the top of the table, label each column with one of your stakeholders. At the left of the table, copy the list of stakeholders, one for each row. If the stakeholders were {Fred, Ethel, Lucy}, then the table would look like this:


Inside each cell, list any duties or responsibilities that the stakeholder on the left owes the stakeholder above. For example, three of the cells are marked in the sample table. Don’t neglect the cells that describe duties people have to themselves.

fred ethel lucy fred things that fred owes lucy ethel things that ethel owes ethel lucy things that lucy owes fred

Explanation / Answer

Please Note: You have posted more than one Question. I have answered the first question and all its parts. Please Re-Post Separate for other Questions.

Answer)

1 a. Practice creating analogies—Pick three topics from the list shown here, or make up some topics of your own that involve technology and humans. For each topic, think of an analogous situation that does not involve computing. For example, if you picked “online education and cheating,” an obvious analogy would be to consider

face-to-face education and cheating. If you picked “personal privacy when surfing the Web,” an analogy might be “personal privacy when checking out library books.” When you’ve picked your three topics and your analogy for each, make a short list of how each analogy is like the topic and how the analogy is different from the topic.

Answer)

We have chosen 3 topic for the analogies.

Analogies:

Personal privacy when surfing the Web - Analogous situation would be Personal privacy in physical life and physical forms where we give out phone number and personal details face to face or on forms

library Internet use - Analogous situation would be the issuance of books for a specific criteria to specific age groups

the right to buy violent games - According to age limit, there is be a limit on buying adult content and magazines

b. Practice finding stakeholders—Pick your favorite topic from among the three topics you chose in Exercise 1a. For that topic, make a new list of all the significant stakeholders in the topic. (Hint: Remember that a stakeholder can be an individual, a group of individuals, a corporation, perhaps the environment, or any other entities you think are important in your topic.) For each stakeholder, list what the stakeholder most values in this situation.

It might help you to frame a specific question or propose a particular action related to the topic. For example, if your topic is “online education and cheating,” you might propose the action, “online education should be suspended until online cheating can be better controlled” or “online education should include automated cheating detection.” This narrowing of the topic sometimes simplifies the task of imagining what people value with respect to this issue.

Answer)

Personal privacy when surfing the Web - stakeholders would be :

the user who is surfing the web,

the website hoster/company who is hosting the website,

the environment and the system which is being compromised

c. Practice identifying costs and benefits—For each stakeholder you identified in Exercise 1b, list the possible costs and benefits in the situation you chose. In many cases, these are potential costs and benefits, things that might or might not happen. Sometimes the words vulnerability and opportunity can be more accurate than cost and benefit because of uncertainties in the situation.

Answer)

Personal privacy when surfing the Web - stakeholders would be :

the user who is surfing the web,

the website hoster/company who is hosting the website,

the environment and the system which is being compromized/secured

Identifying costs and benefits:

Costs:

Monetary costs to the website to secure the website to gain trust of the users and secure operations on the user

Security costs to the user when the privacy of the website is not up to the mark

Benefits:

A secure website and service install confidence in the users for user operations on the website

Business gets secure and secure operations lead to profits and easy operations

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote