2021 – 2022 Spring 2022 Management Information Systems (MIS300) Group Assignment 3 (15%) - Chapter 8 Start Date: 4 April 2022 - 00:00 Due Date: 10 April 2022 - 23:59 (Please upload your assessment on Moodle using Group Assignment 3 Turnitin submission link) Student Names and IDs: 1. 2. 3. 4. Section: Faculty Name: Total Earned Points: /100 Answer all the following four questions. 1) Salem is planning to spend the evening working on an individual assignment that's due the next morning. Then one of his friends called asking for help. His friend is stranded far from home and needs his help. It will take most of the evening to pick up his friend, bring him home, and return to his studying. Not only that, but he is very tired when he gets home and just falls into bed. The next day his friend, who completed his assignment earlier, suggests that he can just make a copy, put his name on the cover, and hand it in as his work. Salem decided to copy his friend's assignment and put his name on the cover. a. Discuss the case above using the first three ethical structure framework aspects: consequence, society opinion, and the likelihood of an effect. (24 Points) Even if Salem is not breaking any law, copying can seriously impact his academics. While the exact consequences of Salem's actions may seem less server, expected outcomes include automatically failing the course, low grades, probation or academic suspension, or suspension. Salem's academic record will reflect the ethics offense, possibly forcing him to be barred from studies at other institutions and once scarred with plagiarism, publishing an integral part of a reputable academic career. He might lose the ability to publish, most likely destroying his reputation or ending his academic position. In cases where Salem's friend is forced to defend his actions, neither ignorance nor stature explanations will excuse him from legal and ethical ramifications. He will have a negative social opinion. His unethical actions will not have a valid academic justification as Salem should be responsible for her academics regardless of the chores and distance he covers from home to school. Both Salem and his friend may have bypassed the plagiarism policies of their institution. Their explanations are thus unethical as per most institutions' code on plagiarism. Group Assignment 3 Spring 2022 1 The likelihood of their actions being caught and harming their academic reputation is high. One lecturer marks an assignment task. Name and the registration number is the only difference between their assignment. They are thus not likely to escape the ethical and legal consequences of plagiarism. b. Discuss which ethical violation level (minor, serious, or very serious) your behavior presents and why? (6 points) Salem's actions are classified as a serious ethical violation. Much of the consequences of his actions are at an honest and personal level but not on the professional and legal status, as the assignment was for academic purposes but not publication. He can be caught quickly and regarded with suspicion with readily available plagiarism detection tools and software. Ignorance is not an excuse, and his academic records will reflect the ethical offense he has committed. His marks for the unit will be disregarded. If the academic integrity committee is involved, he will be suspended for their first violation. Expulsion may be necessary for further offenses. There are no legal or professional consequences for his actions, as most academic assignments may not consider the absoluteness of copyright laws. In publication cases, legal repercussions necessitate using other persons' material with references and citations. Their act is not a criminal offense; hence little to no legal repercussions. 2) Sarah recently downloaded a few songs by her favorite artist a month before the artist's album was released and shared them with her friends. a. Discuss the case above using the last three ethical structure framework aspects: time consequences, relatedness, and reach of the result. (24 Points) As per the time consequences ethical framework aspect, Sarah produced artistic work illicitly, and her actions will be noticed sooner. She shared her favorite artist's work a month earlier before the owner had them, which is likely to spread further due to the advancement of P2P file-sharing mechanisms. Her act of downloading and distributing content at a high rate is driven by the belief that what she is doing is Group Assignment 3 Spring 2022 2 ethically correct. Her friends may have the same thoughts and thus spread the content even further quickly. This ethical orientation positively correlates with awareness of the social cost of downloading and distributing digital content. It is also associated with the honest belief in downloading these contents and their consequences. Sarah's act and ethical orientation are directly linked with stealing and downloading illegal content in the artist's shoes. Also, her peers are prone to stealing and downloading music illegally. Fear of digital content privacy and consequences is not impacting their propensity to access these contents illegally. Sarah's action affects the artist, the music industry, and other followers following the artist. She might be fined heavily and even face jail time in prison for Sarah. The artist is likely to have fewer sales as most consumers, probably her followers, have listed most of her songs without her consent. b. Discuss which ethical violation level (minor, serious, or very serious) your behavior presents and why? (6 points) Sarah's behavior presents a severe ethical violation level. Sarah can get into severe illegal trouble when caught. In some cases, she can face severe fines and jail time. However, legal trouble is not the only major threat from her digital piracy actions; she exposes her favorite artist to vulnerabilities and malware that can put her systems at serious attack risks. While using the econometric time series model to determine the effect of downloading music contents on consumer expenditures for recorded music, Sarah, as well as her P2P file-sharing action, will be responsible for the significant decline in sales of her favorite artist's album as her friends are likely to share to even more people before the actual release. Besides, it reduces the price elasticity of demand for recorded music, and the artist is expected to increase the sales price. Her act can be attributed to a decline in the dollar value of music shipment to other consumers. Group Assignment 3 Spring 2022 3 3) Give two examples of situations that can be considered an exception to the copyright rule? (20 Points) In face-to-face instruction, copyright laws can be considered an exception. Copyright laws allow the display of the performance of legally purchased or licensed content for direct and strict pedagogical purposes relevant to the course in accredited schools in face-to-face classes at not-toprofit. Such content embrace showcasing movies, performing plays, playing music, projecting pictures, among other displays, and performance of copyrighted materials in the course, provided the work was acquired lawfully. In certain conditions, the Teach Act, in addition, allows learners and teachers or instructors to use copyrighted materials in online class sessions. Instructors must ascertain that their action complies with the Teach Act Compliance Checklist. For instance, they have to ensure that only registered students will access the materials, and they will guide the consumption of the material. Also, they have to ensure that they are including copyright disclaimers in their courses. They can note that "material used in this course may be subject to copyright protection in every class." 4) Denial of Service (DoS) is one of the types of cyber-crimes. a. Discuss in detail what Denial of Service (DoS) is? (10 Points) DoS is a cyberattack that shuts down a computer network of a machine through buffer overflow attacks, ICMP flood, or SYN flood. As a result, authorized users cannot access the network or the device. The denial process accomplishes by flooding target computers with traffic or sending data or information that can trigger a crush. In either instance, legitimate users such as account holders, members, and employees are deprived of access to valuable resources and services. Victims often target web servers of agencies well-established as eCommerce, media companies, banking, trade, and government organizations. Though the attack does not result in theft directly or loss of significant assets and information, victims can suffer a lot of money and time to handle the onslaught. Group Assignment 3 Spring 2022 4 b. Why, in most cases, the big companies are the target of DoS? Give two reasons. (10 Points) Big companies are significantly accelerating digitalization. In turn, they have a growing attack surface. They use BYOT devices to access company resources remotely from shared networks as shot up widening attack surfaces and DoS threats. The issue increases when these organizations know not about the significance of DDoS protection and depend on generic solutions and another hosting/ISP/ Cloud Service provider solutions. These attacks are possible tools for disgruntled employees and competitors. Companies' websites that are down for 5 minutes lose search engine rankings and reputation. Competitors, among other disgruntled employees, are likely to use these attacks to bring about significant reputational damage or erode search engine ranking. Group Assignment 3 Spring 2022 5