You are on page 1of 19

ASSIGNMENT 1

Received Date :
Submission Due Date :

Lecturer : DR ZURIDA ISHAK


Weightage : REPORT (10%), VIDEO (10%)

Semester : JULY 2021

Instruction to students:

 This is GROUP assignment.


 Complete this cover sheet and attach it to your assignment (first page).
Student declaration:
I declare that:
 This assignment is my/our own work
 I/we understand what is meant by plagiarism
 My lecturer has the right to deduct my marks in case of:
- Late submission
- Any plagiarism found in my assignment.
NAME:YOGANAND NAME:THARSSHINA NAME:IVAN NAME:NUR NAME:YUGA
HAM MORTHY A/L NISHAN AMIRAH BINTI A/L SIVANES
SUBRAMANIAN SELVATHIRUMARA AMEERDAS AMIR MATRICS
MATRICS N MATRICS MATRICS NO:012021021
NO:012021071747 MATRICS NO:012021070151 NO:012021071724
NO:012021071746

INTRODUCTION
1
Information system have influenced much beyond the business environment. New technologies
are creating new situation we have never addressed before. How do we manage these devices
new capabilities for use? The moral sense of the profession is expressed through the Code of
Ethics and Professional Conduct.

The ACM Code of Ethics and Professional Conduct provides guidelines for ethical conduct in
the development and use of information technology. End users and IS professionals would live
up to ethical responsibilities. The purpose of the Code is to encourage and manualized the
moral conduct of all advanced and innovative practitioners, teachers, students, and everyone
who has an impact in the computer world. In addition, when violation occur, the Code serves
as the basis for remediation. The Code includes ideas formulated as accountability statements
that are based primarily on information that is always the number one consideration of the
general public. Each precept is supplemented by means of guidelines that gives reasons for
helping the information and use of the percept for computer experts.

2
CONTENT

NO CHAPTER PAGE

1 INTRODUCTION 2

2 SCENARIO 1 4

3 SCENARIO 2 6

4 SCENARIO 3

5 SCENARIO 4

6 SCENARIO 5

7 CONCLUTION

3
SCENARIO 1–1: A FATAL CYBERBULLYING INCIDENT ON MYSPACE

Megan Meier, a 13-year-old resident of Dardenne Prairie, Missouri, had an account on


MySpace where she received a “friend” request from a user named Josh Evans. Evans, who
claimed to be a 16-year-old boy, told Meier that he lived near her and was being home-
schooled by his parents. At first, Evans sent flattering e-mails to Meier, which also suggested
that he might be romantically interested in her. Soon, however, Evans’s remarks turned from
compliments to insults, and Evans informed Meier that he was no longer sure that he wanted
to be friends with her because he heard that she “wasn’t very nice to her friends.” Next,
Meier noticed that some highly derogatory posts about her—e.g., “Megan Meier is a slut”
and “Megan Meier is fat”—began to appear on MySpace. Meier, who was reported to have
suffered from low self-esteem and depression, became increasingly distressed by the online
harassment (cyberbullying) being directed at her—i.e., from both the insulting MySpace
postings and hurtful e-mail messages she continued to receive from Evans. On October 17,
2006, Meier decided to end her life by hanging herself in her bedroom. An investigation of
this incident, following Meier’s death, revealed that Josh Evans was not a teenage boy; she
was Lori Drew, the 49-year-old mother of a former friend of Meier’s.1
Analyse

In this scenario, it is evident that Megan Meier is obviously subject to some form of online
harassment. Bully is the behaviour of a person who hurts or fears a less powerful or smaller
person, often forcing a person not to perform something. any student without exception or
substantially disrupts the orderly operation of the school. Bullying may consist of physical
actions, including gestures, or oral, cyberbullying, electronic, or written communication, and
any threat of retaliation for reporting of such acts. Technology is not restricted to schoolyards
or street corners. bullying. The use of smartphones, e-mails, text, and the social media can be
performed everywhere, even in the home 24 hours a day. To harass, threaten or humiliate you,
cyberbullies use digital technology. Cyberbullying does not, unlike traditional bullying, require
face-to-face contact and not just a few of the testimonies. It requires neither physical strength

4
nor numerical strength. Cyberbullies come in all shapes and sizes. The exchange of personal or
private information on someone else may lead to illegal or criminal behaviour.

Almost anyone with an Internet connection or mobile phones can cyberbully someone
else, often having to reveal their true identity. The scenario, Lori Drew, a 49- year-old mother
of a former friend of Meier’s who create an account and decides to pretend to be a 16-year-old
guys named Josh Evans and claimed that he lived near Meier. From the statement it is clearly
that Lori Drew have the fake profiles on social media and sent flattering emails, which is just to
get closer to Meier so she can do all unethical activities against Meier. Meier noticed that
‘Evans Josh’ posted about Meier after he no longer wanted to be friends with her. Lori Drew,
the actual abuser adapted her life into a teenage boy and kept in touch with the victim for a
month and made her life miserable which leads to death.

There are several ways to dealing with cyberbullying. It is not often easy to deal with
cyber bullying, but we can take steps to deal with it. Our use of technology can be good time to
reassess. If we spend less time on social networks or review texts and e-mails and interact with
real people, for example, it can help us form bullies online. It can contribute to reducing,
anxiety, depression, and loneliness. First don’t respond to any messages or posts that are
written about ourselves. Either hurtful or untrue, no matter how. The answer will only make
matters worse and it is exactly what the cyberbullies want to provoke a response from us, so
just di not please them. In addition, keep cyber bullying evidence, for example, keep abusive
text messages or a website screenshot and then report them to a reliable adult. Often cyberbully
will become more aggressive if we do not report incidents. Next, not look for revenge against
cyberbully by turning ourselves into a cyberbully. Again, the problem will only get worse and
can have serious legal implication for us. Do not say it online, if we are not going to say it in
person. Lastly, prevent cyberbully communication by blocking their email address and mobile
phone number from the contacts of social media. The actions of cyberbullying may violate the
terms and conditions of the site or could even warrant criminal charges, depending on laws in
our area.

5
SCENARIO 1–2: CONTESTING THE OWNERSHIP OF A TWITTER ACCOUNT

Noah Kravitz was utilized by PhoneDog Media, a mobile phone company, for almost four
years. PhoneDog had two divisions: a web based business webpage (phonedog.com) that sells
phones, and a blog that enabled clients to collaborate with the organization. Kravitz made a
blog on Twitter (called Phonedog_Noah) while employed at PhoneDog, and his blog pulled in
17,000 followers when he left the company in October 2010. In any case, Kravitz informed
PhoneDog that he wanted to keep his Twitter blog, with the entirety of his followers
consequently, Kravitz concurred that he would in any case "tweet" sometimes in the interest of
his previous company, under another (Twitter) "handle," or account name, NoahKravitz. At
first, PhoneDog appeared to generally approve of this arrangement. In July 2011, nonetheless,
PhoneDog sued Kravitz, contending that his rundown of Twitter followers was, indeed, an
company list. PhoneDog also contended that it had invested a substantial amount of money in
developing its client list, which it viewed as the property of PhoneDog Media. The company
(as of early 2012) is looking for $340,000 in harms the sum that PhoneDog assessed it had lost
dependent on 17,000 clients at $2.50 per client over an eight-month period (following Kravitz's
departure from the company).

Analyse

In this situation, Noah Kravitz was employed by PhoneDog Media, and chose to make his very
own Twitter account using the Company's name in his account name. He created more than
17,000 followers yet it was his very own account. Afterward, Kravitz left the company and
chose he actually needed to use the Twitter account that he made yet needed to make an
arrangement that he would in any case make posts pertaining to the company. Then, at that
point, PhoneDog tried suing Noah for $340,000 for just for every follower being considered a
"client" of the company. Morally, this should not be legal in light of the fact that Noah reserved
the option to use his very own social account at whatever point he picks and for the reasons he
picks.

6
The current issue is that PhoneDog should be more strict making a policy where
representatives can't use Social Networking during work hours, that way they are securing their
right to protection and their clients. They additionally could ask that Noah kindly change his
Twitter. Handle to disassociate himself from the company on the off chance that they disagreed
with it. Legitimately, the PhoneDog company went excessively far in light of the fact that those
17,000 followers were produced by a SNSs, not an company list. Assuming the company
needed to keep getting clients acquired from Noah's social media, they might have recruited
another person to be a Social Media Sales Lead. Ethics becomes troublesome in cyber
technology on the grounds that there are no laws that state what your username needs to
consists of, for sure followers you are allowed to follow regardless of whether they are related
with your work. It is dependent upon the Employers to make employees sign a contract stating
they are not to connect personal with work related SNSs.

7
SCENARIO 1–3: “THE WASHINGTONIENNE” BLOGGER

Jessica Cutler, a former staff assistant to U.S. Senator Michael DeWine (R-Ohio), authored an
online diary (on blogger.com) under the pseudonym “The Washingtonienne.” In May 2004,
she was fired when the contents of her diary appeared in Wonkette: The DC Gossip, a popular
blog in the Washington D.C. area. Until her diary was discovered and published in Wonkette,
Cutler assumed that it had been viewed by only a few of her fellow “staffers” (Washington
D.C. staff assistants) who were interested in reading about the details of her romantic
relationships and sexual encounters. In her diary, Cutler disclosed that she earned an annual
salary of only $25,000 as a staffer and that most of her living expenses were “thankfully
subsidized by a few generous older gentlemen.” She also described some details of her sexual
relationships with these men, one of whom was married and an official in the George W. Bush
administration. (Cutler did not use the real names of these men but instead referred to them via
initials that could easily be linked to their actual identities.) Following her termination as a
staffer, in response to the political fallout and the media attention resulting from the publication
of her diary, Cutler was offered a book contract with a major publisher. She was also
subsequently sued by one of the men implicated in her blog.

Analyse

8
SCENARIO 1–4: DEVELOPING THE CODE FOR A COMPUTERIZED WEAPON
SYSTEM

Sally Bright, a recent graduate from Technical University, has accepted a position as a software
engineer for a company called CyberDefense, Inc. This company has a contract with the U.S.
Defence Department to develop and deliver applications for the U.S. military. When Sally
reports to work on her first day, she is assigned to a controversial project that is developing the
software for a computer system designed to deliver chemical weapons to and from remote
locations. Sally is conflicted about whether she can, given her personal values, agree to work
on this kind of weapon- delivery system, which would not have been possible without
computer technology.

Analyse

From the above scenario, there is no ethical issues has been rise up. Sally made the right choice
what she is supposed to do the moment she started working for the company. Even if it is
opposes Sally’s personal values, she should had been mindful to the company that she choose.
A report issued by the ICRC (International Committee of the Red Cross), in the executive
summary state that "In the perspective on the International Committee of the Red Cross
(ICRC), human control should be kept up with over weapon frameworks and the utilization of
power to guarantee consistence with worldwide law and to fulfil moral concerns, and States
should work desperately to set up limits on self-rule in weapon frameworks". Consider that
long before computing technologies were available, engineers were confronted with ethical
choices involving whether or not to participate in the design and development of certain kinds
of controversial technological systems. If I were in Sally position, I will do what is needed to
be done by the company. The software developed can be tool to provide safety for the country
in case a war breaks out at the country. It can be used to protect the lives of citizen residing in
the country.

9
SCENARIO 1–5: DIGITAL PIRACY

Harry Flick is an undergraduate student at Pleasantville State College. In many ways,


Harry’s interests are similar to those of typical students who attend his college. But Harry is
also very fond of classic movies, especially films that were made before 1950. DVD copies
of these movies are difficult to find; those that are available tend to be expensive to purchase,
and very few are available for loan at libraries. One day, Harry discovers a Web site that has
several classic films (in digital form) freely available for downloading. Since the movies are
still protected by copyright, however, Harry has some concerns about whether it would be
permissible for him to download any of these films (even if only for private use).
Analyse

From this scenario, there could be an ethical issue would raise up after reading it. If Harry
Flick has the chance to download classic films from website, that is definitely illegal because
he would be downloading the unlicensed content. He needs to get the copyright holder’s
permission before downloading those movies. If I’m interest watching classic movies in this
situation what I will do is 1 st I will find in You tube because you tube is legal application and
also everyone can use. If some classic movies not in you tube means I will pay monthly for
Netflix and can watch favorite classic movies in netflix because it’s safe and it’s not a causes
of digital piracy.

The most common reason for digital piracy is the unwillingness to pay. Obviously, people
want things for free. Example Torrent websites and P2P sharing make it easier than ever to
download. You can obtain everything from software to movies and books. And in many cases
people download illegally due to financial hardship. They simply cannot afford to buy it. Many
people just do not have the finances available to purchase legally. Some people do it for
financial gain. Hackers download pirated content with the intention of reselling it, making a
profit. Hackers and social engineers use pirated content to spread malware and infect a user’s
system.

10
11
CONCLUTION

The objectives of computer ethics are to ensure the privacy and safety of the computer users, to
helps people use the computer in the right way and to guarantee that the works that done by
someone did not declare by other people. Therefore, IT professionals must follow all the ways
to improve our ethics in order to achieve all the objectives as this issue really important in our
daily life which are to protect our privacy, maintain our security and to respect others.

As IT professionals, we are encouraged to recognize the activities that follow computer ethics
and also the activities that against computer ethics as a precaution in our life. Computer ethics
are very important for us to live comfortably and in peace hence we must do our part as
computer users.

12
WRITE UP ASSESSMENT RUBRICS (GROUP)

Name: YOGANANDHAM SUBRAMANIAN Id No: 012021071747 – BMWT


Name: THARSSHINAMORTHY A/L SELVATHIRUMARAN Id No: 012021071746 – BCF

Name: IVAN NISHAN AMEERDAS Id No: 012021071751 – BCF


Name: NUR AMIRAH BINTI AMIR Id No: 012021071724 – BMWT

Name: YUGAN S/O SIVANESAN Id No: 012021021600 – BCF

Assessment EXCELLENT GOOD ACCEPTABLE POOR UNACCEPTABLE Marks


Criteria
9-10 7-8 5-6 3-4 1-2

Organization Well organized and Well organized Well organized, Well organized, but Weakly organized
structured displaying displaying a displaying a demonstrates
a beginning, a body beginning, a body beginning, a body illogical sequencing
and conclusion, and conclusion, and conclusion but and sentence
demonstrates logical demonstrates demonstrates structure
sequencing and logical sequencing illogical sequencing
sentence structure. and sentence and sentence
Critical thinking skills structure structure.
are evident
Introduction/to The introduction is The introduction is The introduction The introduction There is no clear
pic inviting, states the inviting, states the clearly states the states the main introduction of the
main topic & position main topic & main topic & topic or position, main topic,
and previews the position and position and but does not position or
structure of the paper previews the previews the adequately preview structure of the
and shows the structure of the structure of the the structure of the
13
relationship between paper paper, but is not paper nor is it paper
all topics and particularly inviting particularly inviting
subtopics to the reader to the reader

Contents An accurate and Complete and Almost complete Some explanation is The explanation is
complete explanation accurate and accurate sufficiently sufficiently
of key concepts and explanation of key explanation of key inaccurate, inaccurate,
theories is made, concepts and concepts and incomplete, or incomplete, or
drawing on relevant theories is made, theories is made, confusing that the confusing that the
literature. Enough drawing on relevant drawing on relevant reader gains little reader gains little
detail is presented to literature. Enough literature. Enough information from information from
allow the reader to detail is presented detail is presented the report. the report. It
understand the to allow the reader to allow the reader appears that little
content and make to understand the to understand the attempt has been
judgments about it. In content and make content and make made to help the
addition, applications judgments about it. judgments about it. reader understand
of theory are included the material.
to illuminate issues.
Readers gain insights.

Quality of Supporting details are Supporting details Some details don’t Details are Unable to find
information specific to topic and are specific to topic support the report somewhat sketchy. specific details.
provide the necessary and provide the topic.
information correctly necessary
supported by some information.
references.

14
Conclusion Numerous detailed Numerous detailed The conclusion is The conclusion is There is no clear
conclusions are conclusions are recognizable and recognizable, but conclusion, the
reached from the reached from the ties up almost all does not tie up paper just ends
evidence offered and evidence offered the loose ends several loose ends
leave the reader with
a feeling that they
understand what the
writer is “getting at.”

Use of tables Extensive use of Good use of tables Some use of tables Limited use of No use of tables
and figures tables and figures and figures to show and figures to show tables and figures and figures to
effectively to show data and summarize data and summarize effectively to show show data and
data and summarize the findings; not the findings; poor data and summarize summarize the
the findings; professional quality quality the findings; poor findings
professional looking shown in refereed quality
journals
Interest level Vocabulary is varied; Vocabulary is Vocabulary is Basic vocabulary; Vocabulary used
supporting details varied; supporting unimaginative; needs descriptive mostly lead to
vivid details useful details lack “color” words misunderstanding
of certain
sentences.

Grammar and Punctuation and Punctuation and There is one error in There are two or There are four or
spelling capitalization are capitalization are punctuation and / three errors in more errors in
correct including the correct or capitalization punctuation and / punctuation and /
arrangement of or capitalization or capitalization
words
Following Following format, Following format, Following format Following format, Not following

15
format & include table of include table of and include but there is no format and there is
Include content, title of each content, title of reference reference no reference
support topic and include each topic and
content reference following include reference
APA style format

Neatness Typed; clean; neatly Typed; clean; with Typed; report cover, Typed; report cover Simply typed;
organized with a well- report cover; neatly and no table of is x following poorly organized;
designed report organized; have contents; no use of template, no table no report cover,
cover; effective use of table of contents color of contents; no use no table of
color of color contents, and no
page numbers
TOTAL MARKS /100

16
VIDEO RUBRICS (GROUP)

Performance Accomplished Developing Beginning Total


Element (1-3) (4-7) (8-10) Points

Introduction The introduction does not orient The introduction is clear and coherent The introduction is motivating, and hooks
the viewer to what will follow. and evokes moderate interest/response the viewer from the beginning.
from the viewer.

Correctly identifies what to Identifies some irrelevant points to Incorrectly identifies what to collect
collect and/or study. study or items to collect. and/or study.
Preparing Chooses appropriate method of Method of documentation is not Chooses inappropriate method of  
documentation and prepares most appropriate; prepares some documentation, fails to prepare
needed materials and tools. materials and tools. materials and tools.

Sufficiently practices using the


equipment that will be used. Practices using the equipment a
Fails to practice using the equipment.
little, mastery not attained.
Practices interviewing
Fails to practice interviewing
Practicing informants. Practices interviewing informants a  
informants.
little.
Plans and practices videotaping;
Fails to practice videotaping.
checks for background Practices videotaping insufficiently.
interference.

Conducting Collects appropriate notebooks, Collects most fieldwork tools. Collects inappropriate or inadequate  
Fieldwork forms, surveys and/or fieldwork tools.
Asks mostly meaningful questions,
checklists.
recording mostly accurate. Takes insufficient photographs, labels
Asks meaningful questions, them inadequately.
Takes a large number of high-quality
records accurately.
17
Takes high-quality photographs;
photographs, labels them
labels prints, slides, diskettes.
adequately.
Tape records at appropriate Tape recordings of poor quality.
Tape recordings lacking in quality,
volume, with no interfering
some interferences.
noises.

Archives most recorded materials


Archives recorded materials Archives few recorded materials
where they will be protected.
where they will be protected. where they will be protected.
Processing Labels some materials inaccurately,
Labels materials carefully, files Labels most materials inaccurately,
Fieldwork files most permission slips.  
permission slips with materials. files few permission slips.
Materials
Transcribes some tapes
Transcribes tapes accurately; Transcribes most tapes inaccurately,
inaccurately, proofs and edits most
proofs and edits transcriptions. proofs and edits few transcriptions.
transcriptions.

Subject Subject knowledge is not Subject knowledge is evident in Subject knowledge is evident
Content evident. Information is much of the video. Most throughout the video. All
confusing, incorrect, or flawed. information is clear, appropriate, information is clear, appropriate and
and correct. correct.

Video content The video lacks a central theme, Information is connected to a theme. Video includes a clear statement of
and clear point of view, and logical Details are logical and information is purpose. Events and messages are
organization sequence of information. Much of relevant throughout most of the video presented in a logical order, with relevant
the information is irrelevant to the information that supports the video’s
overall message main ideas.

18
Group Students needed to be reminded to All students contributed a fair share to All students contributed equally to the
Cooperation stay on task frequently. One or two the project, though some workloads video. Students stayed on task at all
people did all the work. Students varied. Students had to be reminded times. Students worked with each other
argued with one another or left occasionally to stay on task. Students in a friendly manner.
some students out of the process. made an effort to include all group
members in the process.

Production Video is of poor quality and is Tape is edited. A variety of transitions Tape is edited. Video runs smoothly from
unedited. There are no transitions are used and most transitions help tell shot to shot. A variety of transitions are
added or transitions are used so the story. Most of video has good used to assist in communicating the main
frequently that they detract from pacing and timing. Graphics are used idea. Shots and scenes work well
the video. There are no graphics. appropriately. together. Graphics explain and reinforce
key points in the video.

Chooses appropriate medium for Chooses inappropriate medium for Chooses inappropriate medium for
presenting findings. presenting findings. presenting findings.
Presenting
 
Findings Conveys a message through creative Conveys a message through mundane Fails to convey a message through
presentation. presentation. creative presentation.

19

You might also like