Consider the following situation. You are an application developer who has been asked to build a new game under contract. The game is targeting youngsters between the ages of 6-10. The player wins points by shooting the wrong answers to math problems until the correct answer is left on the screen. Children can see their ranking while playing, but the ranking resets when they leave the game. The ACM Code of Ethics suggests professionals should embrace: I. Contribute to society and to human well-being, acknowledging that all people are stakeholders in computing. 2. Avoid harm. 3. Be honest and trustworthy. 4. Be fair and take action not to discriminate 5. Respect the work required to produce new ideas, inventions, creative works, and computing artifacts. 6. Respect privacy. 7. Honor confidentiality. For the scenario presented below, identify which portions of the above given ACM Code of Ethics is potentially being violated and which of the workable ethical theories from Quinn apply. Scenario: The owner wants you to use techniques to keep the children playing longer, so that they can collect data about gender, age and community, so they can later share the data with industry partners who sell tutoring services. Please write your answer in no more than 4 lines.

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Consider the following situation.
You are an application developer who has been asked to build a new game under contract. The
game is targeting youngsters between the ages of 6-10. The player wins points by shooting the
wrong answers to math problems until the correct answer is left on the screen. Children can see
their ranking while playing, but the ranking resets when they leave the game.


The ACM Code of Ethics suggests professionals should embrace:

I. Contribute to society and to human well-being, acknowledging that all people are
stakeholders in computing.
2. Avoid harm.
3. Be honest and trustworthy.
4. Be fair and take action not to discriminate
5. Respect the work required to produce new ideas, inventions, creative works, and
computing artifacts.
6. Respect privacy.
7. Honor confidentiality.

For the scenario presented below, identify which portions of the above given ACM
Code of Ethics is potentially being violated and which of the workable ethical theories from
Quinn apply.

Scenario:

The owner wants you to use techniques to keep the children playing longer, so that they
can collect data about gender, age and community, so they can later share the data with
industry partners who sell tutoring services.

Please write your answer in no more than 4 lines.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Function Arguments
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-engineering and related others by exploring similar questions and additional content below.
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY