(100 possible points)
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
Choose one topic related to cyberethics or cybertechnology for further research. Cyberethics topics are those related to the field of study that examines moral, legal, and social issues involving cybertechnology. Cybertechnology refers to computer and information technologies that range from standalone PCs, to computer networks, to the Internet, social networking applications or virtual worlds.
Papers should be 2 – 3 pages in length, 12 pt. Times New Roman font and double spaced.
The paper should include a title page and a references page; these pages do not count towards the 2 – 3 pages. Create the paper in Word or another word processor and save the file and attach it to your post in Discussions.
Your paper should be written in APA format and will need to include:
1. An introduction to the chosen topic, including an original thesis statement making an assumption or argument about your chosen topic.
2. An identification and description of the selected cybertechnology or cyberethics issue.
Please use this following site as a reference for APA format: https://owl.english.purdue.edu/owl/resource/560/02…
Step 1. Identify a practice involving cybertechnology, or a feature of that technology, that is controversial from a moral perspective:
1a. Disclose any hidden or opaque features.
1b. Assess any descriptive components of the ethical issue via the sociological implications it has for relevant social institutions and sociodemographic groups.
1c. In analyzing the normative elements of that issue, determine whether there are any specific guidelines, that is, social policies or ethical codes, that can help resolve the issue (e.g., see the relevant professional codes of conduct described in Chapter 4 as well as in Appendices A–E, available at http://bcs.wiley.com/he-bcs/Books?action=mininav&bcsId=10097&itemId=1119186579&assetId=409679&resourceId=40283&newwindow=true).
1d. If the normative ethical issue cannot be resolved through the application of existing policies, codes of conduct, and so on, go to Step 2.
Step 2. Analyze the ethical issue by clarifying concepts and situating it in a context:
2a. If a policy vacuums exists, go to Step 2b; otherwise, go to Step 3.
2b. Clear up any conceptual muddles involving the policy vacuum and go to Step 3.
Step 3. Deliberate on the ethical issue. The deliberation process requires two stages:
3a. Apply one or more ethical theories (see Chapter 2) to the analysis of the moral issue, and then, go to Step 3b.
3b. Justify the position you reached by evaluating it via the standards and criteria for successful logic argumentation (see Chapter 3).
Enter at least two premises (or claim) and at least one conclusion. See pages 72 – 75 of the text for additional information on constructing premises and conclusions.
Then determine if the argument is valid, and if so is it sound and explain why it is sound or unsound.
If the argument is invalid, state if it is inductive or fallacious and explain why.
Then determine if your premises are true or false in the actual world and explain why.
Make an overall assessment of the argument by determining both the argument’s strength of reasoning and the truth conditions of each of the argument’s premises.
Deliberations over the various aspects of the issue or topic. See page 66-70 for additional information about the key elements of Moor’s framework.
Moor’s ethical framework of just consequentialism can be summarized in terms of a strategy that includes the following steps:
Identify some policies that could address this issue. Then follow the steps below to choose the best policy.
1. Deliberate over various policies from an impartial point of view to determine
whether they meet the criteria for being ethical policies. A policy is ethical, if it
a. does not cause any unnecessary harms to individuals and groups, and
b. supports individual rights, the fulﬁlling of duties, etc.
2. Select the best policy from the set of just policies arrived at in the deliberation
stage by ranking ethical policies in terms of beneﬁts and (justiﬁable) harms. In
doing this, be sure to
a. weigh carefully between the good consequences and bad consequences in the ethical policies, and
b. distinguish between disagreements about facts and disagreements about
principles and values, when deciding which particular ethical policy should be adopted. (Knowledge about the facts surrounding a particular case should inform the decision-making process.)
Evidence drawn from at least 5 sources to support the thesis. Wikipedia cannot be used as one of the sources.
Possible 100 points:
Paper: 90 Points possible
Please refer to the CSM GRADING STANDARDS FOR COLLEGE PAPERS http://www.itc.csmd.edu/lan/gradestandards.htm
And here is the rubric: http://www.itc.csmd.edu/lan/gradingstandardsrubric…
-5 points for each spelling, grammar, or punctuation error
-10 points if you do not include any portion of the above requirements
Responses to classmates: 10 points possible
Each response is worth 5 points -5 points if each post is not minimum length of 100 words -2 points for each punctuation, grammar or spelling error
Cyberattacks on personal health records growing ‘exponentially’ https://www.washingtonpost.com/news/powerpost/wp/2…
Is Kodi Legal? Safe? http://wtvpc.com/is-kodi-legal-as-users-rise-so-do…
* Privacy + search engines
* Privacy + cell phones
* Bionic people, adding technological capabilities to our bodies
* Designer babies: using technology to build special capabilities into our babies
* Self driving cars and the trolley problem
* Search engine or social networking site’s bubbles—where you only see what you like
* Search engine algorithms used to hide results from users
* Privacy + search engines
* Artificial intelligence
* Ambient intelligence
* Autonomous machines
* Privacy and Internet cookies
* Cyber bullying, stalking, crime
* Data mining
* Data matching
* Digital divide
* Digital rights management
* Identity theft
* Location privacy
* Machine ethics
* Intellectual property
* Informational privacy
* Ethics of games where players break laws and do violence
* Pervasive computing
* Privacy-enhancing technologies
* Use of RFIDs for purposes other than intended
* Sexting by minors with implications with laws designed for adults and child porn
* Turing test—how close are computers to being able to pass it?