Uploaded by Wyckie

MIS300 Sp22 YZ GA 3

advertisement
2021 – 2022
Spring 2022
Management Information Systems (MIS300)
Group Assignment 3 (15%) - Chapter 8
Start Date: 4 April 2022 - 00:00
Due Date: 10 April 2022 - 23:59
(Please upload your assessment on Moodle using Group Assignment 3 Turnitin submission link)
Student Names and IDs:
1.
2.
3.
4.
Section:
Faculty Name:
Total Earned Points:
/100
Answer all the following four questions.
1) Salem is planning to spend the evening working on an individual assignment that's due
the next morning. Then one of his friends called asking for help. His friend is stranded
far from home and needs his help. It will take most of the evening to pick up his friend,
bring him home, and return to his studying. Not only that, but he is very tired when
he gets home and just falls into bed. The next day his friend, who completed his
assignment earlier, suggests that he can just make a copy, put his name on the cover,
and hand it in as his work. Salem decided to copy his friend's assignment and put his
name on the cover.
a. Discuss the case above using the first three ethical structure framework
aspects: consequence, society opinion, and the likelihood of an effect. (24
Points)
Even if Salem is not breaking any law, copying can seriously
impact his academics. While the exact consequences of Salem's actions
may seem less server, expected outcomes include automatically failing
the course, low grades, probation or academic suspension, or
suspension. Salem's academic record will reflect the ethics offense,
possibly forcing him to be barred from studies at other institutions and
once scarred with plagiarism, publishing an integral part of a reputable
academic career. He might lose the ability to publish, most likely
destroying his reputation or ending his academic position.
In cases where Salem's friend is forced to defend his actions,
neither ignorance nor stature explanations will excuse him from legal
and ethical ramifications. He will have a negative social opinion. His
unethical actions will not have a valid academic justification as Salem
should be responsible for her academics regardless of the chores and
distance he covers from home to school. Both Salem and his friend may
have bypassed the plagiarism policies of their institution. Their
explanations are thus unethical as per most institutions' code on
plagiarism.
Group Assignment 3
Spring 2022
1
The likelihood of their actions being caught and harming their
academic reputation is high. One lecturer marks an assignment task.
Name and the registration number is the only difference between their
assignment. They are thus not likely to escape the ethical and legal
consequences of plagiarism.
b. Discuss which ethical violation level (minor, serious, or very serious) your
behavior presents and why? (6 points)
Salem's actions are classified as a serious ethical violation. Much of the
consequences of his actions are at an honest and personal level but not
on the professional and legal status, as the assignment was for
academic purposes but not publication. He can be caught quickly and
regarded with suspicion with readily available plagiarism detection
tools and software. Ignorance is not an excuse, and his academic
records will reflect the ethical offense he has committed. His marks for
the unit will be disregarded. If the academic integrity committee is
involved, he will be suspended for their first violation. Expulsion may
be necessary for further offenses. There are no legal or professional
consequences for his actions, as most academic assignments may not
consider the absoluteness of copyright laws. In publication cases, legal
repercussions necessitate using other persons' material with
references and citations. Their act is not a criminal offense; hence little
to no legal repercussions.
2) Sarah recently downloaded a few songs by her favorite artist a month before the
artist's album was released and shared them with her friends.
a. Discuss the case above using the last three ethical structure framework
aspects: time consequences, relatedness, and reach of the result. (24 Points)
As per the time consequences ethical framework aspect, Sarah
produced artistic work illicitly, and her actions will be noticed sooner.
She shared her favorite artist's work a month earlier before the owner
had them, which is likely to spread further due to the advancement of
P2P file-sharing mechanisms. Her act of downloading and distributing
content at a high rate is driven by the belief that what she is doing is
Group Assignment 3
Spring 2022
2
ethically correct. Her friends may have the same thoughts and thus
spread the content even further quickly.
This ethical orientation positively correlates with awareness of
the social cost of downloading and distributing digital content. It is also
associated with the honest belief in downloading these contents and
their consequences. Sarah's act and ethical orientation are directly
linked with stealing and downloading illegal content in the artist's
shoes. Also, her peers are prone to stealing and downloading music
illegally. Fear of digital content privacy and consequences is not
impacting their propensity to access these contents illegally.
Sarah's action affects the artist, the music industry, and other
followers following the artist. She might be fined heavily and even face
jail time in prison for Sarah. The artist is likely to have fewer sales as
most consumers, probably her followers, have listed most of her songs
without her consent.
b. Discuss which ethical violation level (minor, serious, or very serious) your
behavior presents and why? (6 points)
Sarah's behavior presents a severe ethical violation level. Sarah can get
into severe illegal trouble when caught. In some cases, she can face
severe fines and jail time. However, legal trouble is not the only major
threat from her digital piracy actions; she exposes her favorite artist to
vulnerabilities and malware that can put her systems at serious attack
risks. While using the econometric time series model to determine the
effect of downloading music contents on consumer expenditures for
recorded music, Sarah, as well as her P2P file-sharing action, will be
responsible for the significant decline in sales of her favorite artist's
album as her friends are likely to share to even more people before the
actual release. Besides, it reduces the price elasticity of demand for
recorded music, and the artist is expected to increase the sales price.
Her act can be attributed to a decline in the dollar value of music
shipment to other consumers.
Group Assignment 3
Spring 2022
3
3) Give two examples of situations that can be considered an exception to the
copyright rule? (20 Points)
In face-to-face instruction, copyright laws can be considered an
exception. Copyright laws allow the display of the performance of legally
purchased or licensed content for direct and strict pedagogical purposes
relevant to the course in accredited schools in face-to-face classes at not-toprofit. Such content embrace showcasing movies, performing plays, playing
music, projecting pictures, among other displays, and performance of
copyrighted materials in the course, provided the work was acquired lawfully.
In certain conditions, the Teach Act, in addition, allows learners and
teachers or instructors to use copyrighted materials in online class sessions.
Instructors must ascertain that their action complies with the Teach Act
Compliance Checklist. For instance, they have to ensure that only registered
students will access the materials, and they will guide the consumption of the
material. Also, they have to ensure that they are including copyright
disclaimers in their courses. They can note that "material used in this course
may be subject to copyright protection in every class."
4) Denial of Service (DoS) is one of the types of cyber-crimes.
a. Discuss in detail what Denial of Service (DoS) is? (10 Points)
DoS is a cyberattack that shuts down a computer network of a machine
through buffer overflow attacks, ICMP flood, or SYN flood. As a result,
authorized users cannot access the network or the device. The denial
process accomplishes by flooding target computers with traffic or
sending data or information that can trigger a crush. In either instance,
legitimate users such as account holders, members, and employees are
deprived of access to valuable resources and services. Victims often
target web servers of agencies well-established as eCommerce, media
companies, banking, trade, and government organizations. Though the
attack does not result in theft directly or loss of significant assets and
information, victims can suffer a lot of money and time to handle the
onslaught.
Group Assignment 3
Spring 2022
4
b. Why, in most cases, the big companies are the target of DoS? Give two
reasons. (10 Points)
Big companies are significantly accelerating digitalization. In
turn, they have a growing attack surface. They use BYOT devices to
access company resources remotely from shared networks as shot up
widening attack surfaces and DoS threats. The issue increases when
these organizations know not about the significance of DDoS
protection and depend on generic solutions and another hosting/ISP/
Cloud Service provider solutions.
These attacks are possible tools for disgruntled employees and
competitors. Companies' websites that are down for 5 minutes lose
search engine rankings and reputation. Competitors, among other
disgruntled employees, are likely to use these attacks to bring about
significant reputational damage or erode search engine ranking.
Group Assignment 3
Spring 2022
5
Download