Short Answer_ Ethical Concerns
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
100
Subject
Computer Science
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by ProfessorProtonBear6
SCS-100-H1763
Professor McLaurin-Hill
September 12, 2020 Short Answer: Ethical Concerns
1. Proposal 1: Racial Predisposition – The aim of this study is to examine the direct link between
race and violent criminal activity. In this study, I plan to prove the direct and positive correlation between race and incidence of committing violent crimes. This will then prove that race is the strongest indicator of tendency toward violent crimes. Looking at this proposal there is no means of gathering evidence. To gather correct information you would need to persuade your participants into committing violent crimes. This brings about ethical concerns because you are then allowing people to then get hurt for the information needed to prove your point. There would be no way of doing an experimental study rather they would need to look at crimes committed in the past and compare it to race. 2. Proposal 2: Electroshock Therapy – In this study, I will examine the effect of electroshock therapy on undesirable behavior in human subjects. This study will administer electrical shocks to human subjects as a disciplinary measure when undesirable behavior is observed. The goal of the study is to determine whether the electroshock therapy is a suitable treatment for resolving disciplinary issues in preteens and adolescents. If this therapy is found to be effective, it will be prescribed to resolve disciplinary issues in preteens and adolescents. The first ethical issue while reading this is that the proposal does not specify the voltage at which
will be administered to the participants. The voltage should be enough to influence behavior but should not harm them. Another ethical issue in this proposal is that there is no criteria to what “undesirable behavior” means. When doing this experiment more than one observer should be observing to control for bias.
3. Proposal 3: Health Problems, Diet, and Socioeconomic Status – This study aims to examine the relationship between health problems (diabetes, heart disease, and obesity), diet, and socioeconomic status. It is proposed that people of lower socioeconomic status are more likely to
encounter these problems. Research will be conducted on human subjects where data are collected on diet (the types of food consumed along with money spent on food), and this will be related to the overall health of individuals in the study. The results and findings of this research will be published publicly so others can see the risks of consuming cheap, low-quality food.
Looking at this study there are some ethical concerns regarding health and the benefactor of this experiment. Purposely giving participants low-quality/cheap food can cause negative health concerns with no positive other than information gathered. There should be no intention to cause health concerns with participants just to gather information. There are other means of gathering the same information without causing harm to human life.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Write an essay based on the following:
Describe three (3) types of computer crime in detail and include examples of organizations that were impacted by each type of crime. Elaborate on how the impact of computer crime is quantified in these situations.
Answers must be 100% original.
You should use your own words and ideas.
Word count requirement is between 200 and 500 words
You may include quotes from outside sources that are up to one (1) sentence long only. All quotes must be cited with the appropriate format.
Paraphrasing outside sources without the respective citations and failing to add your own ideas is plagiarism.
Taking your own ideas that are published elsewhere and not properly citing them is plagiarism.
Copying text generated by artificial intelligence such as ChatGPT is plagiarism
arrow_forward
Many individuals believe that the General Data Protection Regulation (GDPR) is a "waste" of the time and money that companies spend trying to comply with it. This view is supported by the fact that the GDPR has received widespread criticism. Is that the case, or is the GDPR a piece of law that has the potential to be put into effect and that has some kind of significance?
arrow_forward
instanse
2
3
8
10
11
12
13
14
15
16
17
18
19
20
21
23
26
27
28
29
30
31
32
33
34
35
36
37
38
39
1401
gold-standard labels
0
0
model-predicted labels
0
0
0
arrow_forward
In this discussion, we will analyze the various Al methods and discuss their
merits and shortcomings. Explain your position and provide supporting evidence.
arrow_forward
Each year, almost 20,000 of children are rushed to the hospital with injuries related to playground accidents. With this information, you are tasked to find a checklist to make sure your local community playground is a safe place to stay. After that, you are to evaluate the playgrounds you have been to before if that is safe for any children to play around. Expound your answer.
arrow_forward
Take into consideration the following scenario: you are interested in studying the correlation that exists between the amount of 'likes' one receives on Facebook and the amount of 'friends' one has on the social media site. Using your own words, please explain the statistical method that you would use.
arrow_forward
What exactly is meant by the term "racial condition," and how is it distinct from a typical condition?
arrow_forward
Mr. Art Pang is the Accounts Receivables manager. We have been assigned to gather the system requirements for a new billing system, and we need to solicit facts from his subordinates. Mr. Pang has expressed his concern that, although he wishes to support us in your fact-finding efforts, his people are extremely busy and must get their jobs done.
1. Describe a fact-finding strategy with rationale, that we could follow to maximize your fact-finding while minimizing the time required from his subordinates.
2. Once we have gathered the requirements, they must be recorded. What techniques would we use to capture the requirements for the new billing system? Explain your rationale.
arrow_forward
Which of the following statement(s) is/are correct for boosting technique?
A) Weight of observation, to be selected while building the next weak learner, increases if the observation is correctly classified
B) Weight of observation, to be selected while building the next weak learner, increases, if the observation is incorrectly classified
C) Weight of observation, to be selected while building the next weak learner, decreases if the observation is correctly classified
D) Weight of observation, to be selected while building the next weak learner, decreases if the observation is incorrectly classified
arrow_forward
In what ways can you explain the following? With any basic example throughout SDLC.
arrow_forward
. Consider the following scenario and answer the questions given atthe end The study involved 55 students (23 male, 32 female) and used a mixed methods approach,involving a questionnaire with open ended questions, Likert scale questionnaire and interviewsthat aimed to determine students' perceptions of their performance. Five main areas wereinvestigated with the open-ended questions: defining clinical reasoning; advantages anddisadvantages of clinical case studies; the effectiveness of clinical case studies in comparisonto real patients; and whether clinical case studies helped students working in a sports injuryclinic. Students completed a 5-point Likert scale that asked three statements regarding theclinical environment. Following the questionnaire, a sample of 15 students were randomlyselected for individual interviews. The results suggested that the students' responses weregenerally in favour of the use of clinical case studies to aid the development of confidence,communication and…
arrow_forward
Problem 5: Investigating Adversarial Robustness in Deep Learning Models
for Autonomous Driving
Background: Deep learning models used in autonomous driving systems are susceptible to
adversarial attacks, which can compromise safety by causing the system to make incorrect decisions.
Ensuring robustness against such attacks is critical for the reliability of autonomous vehicles.
Task: Conduct an in-depth investigation into the adversarial robustness of deep learning models
deployed in autonomous driving applications. Your study should encompass the following aspects:
1. Threat Modeling:
Define potential adversarial attack vectors specific to autonomous driving (e.g..
perturbations in camera images, sensor spoofing).
. Categorize attacks based on their capabilities (eg, white-box vs. black-box, targeted vs.
untargeted).
2. Model Selection and Baseline Performance:
.
•
Select state-of-the-art deep learning models used in autonomous driving tasks (e.g., object
detection, lane keeping).…
arrow_forward
Week 3: Discussion Standards for Evidence Collection & Volatile Data Collection 22 unread replies.22 replies. Submit your initial post for one of these two options. Option 1- Evidence Collection Standards Discuss the similarities and differences in standards for collecting evidence in private, civil, and criminal investigations. Describe the likely places where the different types of investigations will occur. Describe who will be involved in each type of investigation. Option 2 Volatile Data Describe volatile data, including situations when a forensic examiner would need to collect it. Explain the possible forensic relevance of volatile data. Explain differences in recommendations for first responders and forensic specialists for collecting volatile data. What equipment and resources would a forensic specialist need to collect volatile data?
arrow_forward
Q1) Prepare the sample questioner containing 15-20 questions to distribute among the patients for implementing social audit in primary health care. The questioners should be related to Patients’ Voices, Rights and Responsibilities.
arrow_forward
*need correct answer plz
arrow_forward
Explain the differences among pre-treatment, primary treatment, secondary treatment,and tertiary treatment, and show how they are related.
arrow_forward
5. What is the tradeoff between bias and variance?
arrow_forward
When and why would you use an ADT? What exactly are the benefits of ADTs, precisely? How can the concept of heredity make it easier to solve a problem?
arrow_forward
Data collection strategies focus on what the phenomenon means to participants
a.
False
b.
True
arrow_forward
If the standard deviation of the vehicle speed crossing a road section is 5 mph. We want to estimate the mean speed within ±1.5 of the true value with 95% confidence. What would be the sample size for this study to address this objective?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- Write an essay based on the following: Describe three (3) types of computer crime in detail and include examples of organizations that were impacted by each type of crime. Elaborate on how the impact of computer crime is quantified in these situations. Answers must be 100% original. You should use your own words and ideas. Word count requirement is between 200 and 500 words You may include quotes from outside sources that are up to one (1) sentence long only. All quotes must be cited with the appropriate format. Paraphrasing outside sources without the respective citations and failing to add your own ideas is plagiarism. Taking your own ideas that are published elsewhere and not properly citing them is plagiarism. Copying text generated by artificial intelligence such as ChatGPT is plagiarismarrow_forwardMany individuals believe that the General Data Protection Regulation (GDPR) is a "waste" of the time and money that companies spend trying to comply with it. This view is supported by the fact that the GDPR has received widespread criticism. Is that the case, or is the GDPR a piece of law that has the potential to be put into effect and that has some kind of significance?arrow_forwardinstanse 2 3 8 10 11 12 13 14 15 16 17 18 19 20 21 23 26 27 28 29 30 31 32 33 34 35 36 37 38 39 1401 gold-standard labels 0 0 model-predicted labels 0 0 0arrow_forward
- In this discussion, we will analyze the various Al methods and discuss their merits and shortcomings. Explain your position and provide supporting evidence.arrow_forwardEach year, almost 20,000 of children are rushed to the hospital with injuries related to playground accidents. With this information, you are tasked to find a checklist to make sure your local community playground is a safe place to stay. After that, you are to evaluate the playgrounds you have been to before if that is safe for any children to play around. Expound your answer.arrow_forwardTake into consideration the following scenario: you are interested in studying the correlation that exists between the amount of 'likes' one receives on Facebook and the amount of 'friends' one has on the social media site. Using your own words, please explain the statistical method that you would use.arrow_forward
- What exactly is meant by the term "racial condition," and how is it distinct from a typical condition?arrow_forwardMr. Art Pang is the Accounts Receivables manager. We have been assigned to gather the system requirements for a new billing system, and we need to solicit facts from his subordinates. Mr. Pang has expressed his concern that, although he wishes to support us in your fact-finding efforts, his people are extremely busy and must get their jobs done. 1. Describe a fact-finding strategy with rationale, that we could follow to maximize your fact-finding while minimizing the time required from his subordinates. 2. Once we have gathered the requirements, they must be recorded. What techniques would we use to capture the requirements for the new billing system? Explain your rationale.arrow_forwardWhich of the following statement(s) is/are correct for boosting technique? A) Weight of observation, to be selected while building the next weak learner, increases if the observation is correctly classified B) Weight of observation, to be selected while building the next weak learner, increases, if the observation is incorrectly classified C) Weight of observation, to be selected while building the next weak learner, decreases if the observation is correctly classified D) Weight of observation, to be selected while building the next weak learner, decreases if the observation is incorrectly classifiedarrow_forward
- In what ways can you explain the following? With any basic example throughout SDLC.arrow_forward. Consider the following scenario and answer the questions given atthe end The study involved 55 students (23 male, 32 female) and used a mixed methods approach,involving a questionnaire with open ended questions, Likert scale questionnaire and interviewsthat aimed to determine students' perceptions of their performance. Five main areas wereinvestigated with the open-ended questions: defining clinical reasoning; advantages anddisadvantages of clinical case studies; the effectiveness of clinical case studies in comparisonto real patients; and whether clinical case studies helped students working in a sports injuryclinic. Students completed a 5-point Likert scale that asked three statements regarding theclinical environment. Following the questionnaire, a sample of 15 students were randomlyselected for individual interviews. The results suggested that the students' responses weregenerally in favour of the use of clinical case studies to aid the development of confidence,communication and…arrow_forwardProblem 5: Investigating Adversarial Robustness in Deep Learning Models for Autonomous Driving Background: Deep learning models used in autonomous driving systems are susceptible to adversarial attacks, which can compromise safety by causing the system to make incorrect decisions. Ensuring robustness against such attacks is critical for the reliability of autonomous vehicles. Task: Conduct an in-depth investigation into the adversarial robustness of deep learning models deployed in autonomous driving applications. Your study should encompass the following aspects: 1. Threat Modeling: Define potential adversarial attack vectors specific to autonomous driving (e.g.. perturbations in camera images, sensor spoofing). . Categorize attacks based on their capabilities (eg, white-box vs. black-box, targeted vs. untargeted). 2. Model Selection and Baseline Performance: . • Select state-of-the-art deep learning models used in autonomous driving tasks (e.g., object detection, lane keeping).…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning