Identify and explain each of the values and issues that are relevant to this problem. Be sure to include both professional ethics and social issues.

This article describes cutting-edge research and some possible future implementations. Use the analytical framework developed in this course to identify potential problems and work through the implications.

Langston, J. (2016, August 17) Interscatter enables first implanted devices, contact lenses, credit cards to ‘talk’ WiFiOpens in a new window Phys.org.

Describe the problem: (~5%)
Briefly restate the problem in your own words.

Values and Issues: (~5%)
Identify and explain each of the values and issues that are relevant to this problem. Be sure to include both professional ethics and social issues.

Organizational Context: (~10%)
Describe the context for the situation or technology. What is the organization? What is the purpose of the organization? Who are all of the relevant stakeholders and how might each group be affected? Be sure to include appropriate legal considerations.

Application: (~60%)
Now that you’ve described the various elements of the framework for analysis, apply all of the above to the problem.

What are possible options? (~20%.)
What are the likely consequences of each of these options (both positive and negative)? (~40%)
Make a recommendation: (~20%)
Given the various stakeholders, organizational needs, laws, Codes of Ethics, ethical theories and values that we explored in this course, what do you recommend and why? Be sure to include why you did NOT select other options. Your grade will be based on your reasoning.

Textbook
Baase, Sara and Henry, Timothy M (2017). A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology / Edition 5

Chapter 6: Work
Chapter 7: Evaluating and Controlling Technology
Chapter 9: Professionalism (you may wish to review this chapter)

Required Online Readings
Agresti, W. (2008, November). An IT body of knowledge: The key to an emerging professionOpens in a new window. IT Professional Magazine, 10(6), 18-22.
Barocas, S., Nissenbaum, H. (2014, November). Big Data’s End Run Around Procedural Privacy ProtectionsOpens in a new window. Communications of the ACM, Vol. 57 No. 11, Pages 31-33.
Calvo, R., Peters, D. D’Mello, S. (2015, November). When Technologies Manipulate Our EmotionsOpens in a new window. Communications of the ACM, Vol. 58 No. 11, Pages 41-42.
Johnson, J. (2016, March). The Question of Information JusticeOpens in a new window. Communications of the ACM, Vol. 59 No. 3, Pages 27-29.
Damien, J., & others. (February 2010). Practical intelligence in IT: Accessing soft skills of IT professionalsOpens in a new window. Communications of the ACM, 53(2): 149-154.
Denning, P. (2014, June). Avalanches Are ComingOpens in a new window. Communications of the ACM, Vol. 57 No. 6, Pages 34-36.
Gallagher, K.P., & others. (June 2010). The requisite variety of skills for IT professionalsOpens in a new window. Communications of the ACM, 53(6): 144-148.
Huff, C., Furchert, A. (2014, July). Toward a Pedagogy of Ethical PracticeOpens in a new window. Communications of the ACM, Vol. 57 No. 7, Pages 25-27.
Miller, K., & Voas, J. (2008, July). Computer scientist, software engineer, or IT professional: Which do you think you are?Opens in a new window IT Professional Magazine, 10(4), 4-6.
Moor, J.H. (2005). Why we need better ethics for emerging technologiesOpens in a new window. Ethics and Information Technology, 7(3): 111-119.
ACM Code of Ethics and Professional ConductOpens in a new window
Software Engineering Code of Ethics and Professional PracticeOpens in a new window