Sale!

CSC 300 Assignment #1 Scenarios solved

Original price was: $35.00.Current price is: $30.00. $25.50

Category:

Description

5/5 - (4 votes)

Introduction
In lecture and tutorial, we have talked about the expansion of computers into everyday society, and how this seeminglyinnocuous and benign technology has resulted in unforeseen consequences. We have also discussed argumentation as animportant form of academic scholarship and how a thesis statement defines an argument for the reader.
Learning Objective
Through this assignment, you will examine an ethical problem, determine the most appropriate solution, take a position,and identify evidence in support of your position.
Submission Requirements
The name of the pdf file is important! We have chosen this naming convention so that when the papers are printed out inalphabetic order (by filename) it is easy to split up the resulting pile by TA. This simplifies our paper handlingsignificantly. (Get it wrong and your paper will probably wind up in the wrong TAs heap)
File Type: .pdf
File Name: __A1.pdf (for example L1_zaleskim_A1.pdf)
Submit your assignment through MarkUs: https://markus.teach.cs.toronto.edu/csc300-2016-09Deadline: Sunday, Oct 2, 2016 at 23:59. (one minute before midnight Sunday night)
Retry Deadline: Sunday, Oct 16, at 23:59.
A1-handout https://docs.google.com/document/d/1JxCSZzDXpGCbo2n0gj41MdJt-h…1 of 5 9/27/2016 12:12 PM
Assignment Requirements
We have selected four Assignment #1 Scenarios (see attached scenarios).
Review all the scenarios and select one of them to discuss. Pretend you are going to write an argumentative positionpaper* for this scenario. For your chosen scenario, you are required to write a thesis statement following the threecharacteristics of a good thesis statement discussed in class and answering the question posed at the end of the scenario.Assume that your thesis statement paragraph immediately follows the “Introduction” paragraph provided.
In addition to your thesis statement, you are required to sketch out the main claims in your argument and theirsupporting evidence in bullet form. You can either use sentence fragments or full sentences in this sketch but yourevidence must be presented hierarchically (see sample).
You may (but are not required to) conduct research to determine what evidence you will use to support your claims. Ifyou choose to use external sources, create a References section and list the websites/books used. We will discuss propercitation practises later in the course so do not worry about formatting your references in this assignment.
Evaluation
Your assignment will be evaluated (out of 10) for the quality of your thesis statement, claims, and supporting evidence,as well as the clarity of your writing and adherence to the formatting requirements.
Formatting Requirements
Use the formatting requirements below to give evaluators sufficient space for feedback and ensure the accurate printingand transfer of your assignment to your tutorial TA for return.
• You will work on this assignment independently.
• Your assignment must not exceed TWO pages (including any references).
• Use Times New Roman or Modern No. 20 in font size 12. Use 8.5″x11″ paper with 1” margins, double spaced.• When submitting your assignment you should NOT have a title or cover page. Instead: Centred at the top of everypage (or in a header below the 1” margin) should be: – – – For example: “John Smith – smithj – L5BA1200”. Bold your CDF ID.
• Include the scenario title and number just below the header on the first page (see sample).
• If your assignment is more than one page long please also include the page number at the bottom.
• Proof-read your work, check for grammar, spelling and punctuation.
• Warning: google doc users have had difficulties in the past with the header being clipped when they save theirpaper as a PDF.
John Smith – smithj – L5 SS2127
Topic: Scenario #4 – Girls Around Me
Thesis Statements: thesis statement goes here.
Supporting Claim 1: claim 1
• evidence in support of claim 1
• sub-evidence
• …
A1-handout https://docs.google.com/document/d/1JxCSZzDXpGCbo2n0gj41MdJt-h…2 of 5 9/27/2016 12:12 PM
• …
Supporting Claim 2: claim 2
• evidence in support of claim 2
• …
• …

Supporting Claim N: claim N
• evidence in support of claim N
• …
• …
References
[1] my reference
Scenario #1 – Facebook Psychology Experiment
Introduction: For one week in 2012, half a million Facebook users took part in a massive psychological experimentaimed at discovering if emotions could be spread through social media. The problem? Users had no idea it washappening. It turns out Facebook routinely runs experiments on users; in fact every Facebook user has been a subject atsome point, whether it be slight modifications in formatting or major feature changes.
Just about every Internet service does experiments, but this one altered users’ news feeds to highlight items with eitherpositive or negative emotional content, and then measured if it affected the emotional content in each user’s futureposts.
While it is agreed the experiment was legal, critics argue this type of testing crosses the line, particularly when consentis buried in a terms of service. Facebook researchers have taken to social media to apologize for the study, but thecompany’s official statement is that Facebook users agree to these types of experiments as part of the terms of service.Question: Does Facebook need more explicit consent for this type of experiment? For all experiments?Scenario #2 – University Email
Introduction: Robert is on the baseball team at a small college in Texas. He’s a high profile player on the team, and as aresult he has a lot of followers on Twitter and a large network on Facebook. For this reason, the members of the athleticboard at his college think it’s necessary to monitor his social media accounts. In Texas, there is no law to preventschools from requiring individuals to give up their personal social media login and password information, so Robert isforced to hand over his social media account information. University officials say that the intent of monitoring is toidentify potential compliance and behavioural issues early on, enabling athletic departments to educate athletes on howto present themselves online. They regularly check what Robert posts and flag certain postings they have issues with.A1-handout https://docs.google.com/document/d/1JxCSZzDXpGCbo2n0gj41MdJt-h…3 of 5 9/27/2016 12:12 PM
One day Robert tweets “Skipping class to break bad #schoolsucks #bettercallsaul #breakingbad.” Since Robert publiclyadmits to skipping class, school officials flag the post and decide to also start monitoring Robert’s email account withoutinforming him. Since the school provides an email account as a service to its students and faculty, it reserves the right tosearch its own system’s stored data. According to the college’s student handbook, administrators may access studentemail accounts in order to safeguard the system or “to ensure compliance with other University rules.” The policy doesnot mention whether or not account owners have to be notified that their emails are searched. When searching Robert’semail account, university officials find several questionable emails between Robert and his tutor. It seems that Robert’stutor has been sending him all answers to homework assignments and quizzes. As a result of the investigation, Robert isplaced on athletic probation and his tutor is fired.
Question: Should universities be allowed to monitor student email and social media accounts (and under whatcircumstances)?
Scenario #3 – Cyber Security Breach
Introduction: Cyber attacks on American companies have become increasingly more common, but not all companiesrespond to security breaches the same way. Companies such as Facebook, Twitter and Apple, have voluntarily gonepublic with their security troubles. Alternatively, a number of companies have continued to deny cyber attacks, despitereports stating otherwise; including, Exxon Mobil, Coca-Cola, Baker Hughes, and others. The U.S. government hasencouraged transparency on cyber attacks as part of a wider effort to protect American intellectual property. Advocatesof disclosing breaches claim it will set a precedent for other companies to get more active in fighting cyber attacks. Themajority of company lawyers advise not to disclose, pointing to potential shareholder lawsuits, embarrassment and fearof inciting future attacks. Health and insurance companies must disclose breaches of patient information, and publiclytraded companies must when an incident affects earnings.
Question: Should companies disclose cyber security breaches? What policy should companies adopt when dealing witha cyber security breach?
Scenario #4 – Girls Around Me
Introduction: In late March 2012, a flurry of blog entries and articles focused on an app called “Girls Around Me.” Theapp, which was produced by a Russian developer and available through the iTunes App Store, presented itself as “arevolutionary new city scanner app that turns your town into a dating paradise!” The app’s website asked, “In the moodfor love, or just after a one-night stand? Girls Around Me puts you in control! Reveal the hottest nightspots, who’s inthem, and how to reach them… Browse photos of lovely local ladies and tap their thumbnail to find out more aboutthem.” The “lovely local ladies” were not people who had signed up to be associated with this app. They had eitherchosen to make their Facebook and Foursquare profiles public, or had simply not reset the default privacy settings ontheir Facebook and Foursquare accounts. By its own description, “Girls Around Me” mashed the publicly available datafrom Facebook and Foursquare and plotted it onto a map. Users of the app would see a map of their surroundings, withthumbnail photos from publicly available profiles of women who had recently “checked into” particular locations in theneighbourhood. Some of those thumbnails might be clustered in busy locations (restaurants, bars, etc.). By clicking on athumbnail, the app user would get access to the Facebook account of the woman in the picture, and be able to access allthe information available there; the user would also be able to send a message to that woman. After “Cult ofMac”blogger John Brownlee wrote about “Girls Around Me” as well as about the reactions of his women friends whenhe showed them the app, Foursquare revoked the app’s access to Foursquare data—alleging that it violated Foursquare’sterms of use. The move rendered the app unusable. In response to the outcry over the “creepiness” of “Girls AroundMe,” the app’s developer, i-Free Innovations, provided a statement to the Wall Street Journal. In it, the company arguedthat it had been made a “scapegoat” in regard to privacy concerns, when “many other mobile apps provide the same ormore extended functionality…” It stressed that “Girls Around Me” does not “search for extra information apart from theinformation that users share with others. … The Facebook accounts shown as available to send a message are theA1-handout https://docs.google.com/document/d/1JxCSZzDXpGCbo2n0gj41MdJt-h…4 of 5 9/27/2016 12:12 PM
accounts that Foursquare users make public in their profiles.” It also added that the app had been available “for severalmonths already and … was downloaded more than 70,000 times. … We were planning to continue developing the appand limit it to showing only public places and venues. … [W]e intended to bring our best effort to … develop filters tolimit user access only to public venues shared by other users.” The company vowed to try to enable current users tokeep using the app, and stated that it had received “numerous positive comments from users who claimed that the apphelped them to discover ‘hot spots’—venues that are popular among girls and boys.” Although many commentatorscontinued to describe “Girls Around Me” as a “creepy girl-stalking app,” some others argued that the fault, if any, laywith the people who allowed their profiles to be public, taking no measures to protect their own privacy. Yet others, likeblogger Kashmir Hill, wrote that the women who showed up on “Girls Around Me” may have made a conscious choiceto make their information public: “Many of us,” she wrote, “have become comfortable putting ourselves out therepublicly in the hopes of making connections with friends and strangers … It’s only natural that this digital openness willtransfer over to the ‘real world,’ and that we will start proactively projecting our digital selves to facilitate in-personinteractions.”
Question: Should companies be allowed to aggregate user data in this manner? Under what circumstances is dataaggregation appropriate?
Reprinted with permission of the Markkula Center for Applied Ethics at Santa Clara University (www.scu.edu/ethics).Published by Google Drive – Report Abuse – Updated automatically every 5 minutesA1-handout https://docs.google.com/document/d/1JxCSZzDXpGCbo2n0gj41MdJt-h…5 of 5 9/27/2016 12:12 PM