Ease Learning is looking for an IT expert to act as a Subject Matter Expert and create assessment questions for a college course.
Ethics in Technology: $15 per item up to 186 items
- The student explains the need for ethics within the field of information technology.
- The student describes the main ethical frameworks that can be used for decision-making in information technology.
$ads={1}
The student explains how ethical decision-making differs from legal decision-making in information technology.- The student explains how IT professionals (i.e., technologists) can use ethical frameworks for decision-making.
- The student identifies components of data privacy in information technology.
- The student determines where the sources of major institutional threats to data privacy exist.
- The student determines where the sources of major personal data exposure threats exist.
- The student determines where the sources of major data system breach threats exist.
- The student determines where the sources of major global data level threats exist.
- The student explains how IT professionals use ethical decision-making to address ethical challenges related to data privacy.
- The student identifies components of data accuracy in information technology.
- The student determines where sources of data accuracy threats exist.
- The student determines where sources of global level threats to data accuracy exist.
- The student explains how IT professionals deal with the ethical challenges related to data accuracy.
- The student explains how IT professionals deal with the ethical challenges related to data property.
- The student identifies components of data access in information technology
- The student determines where the sources of data access threats exist in information technology.
- The student determines where the sources of global level threats to data access exist in information technology.
- The student explains how IT professionals deal with ethical challenges related to data access.
- The student describes the ethical issues regarding the objectives of confidentiality, integrity, and availability (the CIA Triad).
- The student explains how IT professions consider professional relationships in ethical decision-making.
- The student explains why the purpose and value of professional ethics may guide ethical decision-making in information technology.
- The student identifies professional codes of ethics most relevant to information technology professionals.
- The student explains how IT professionals consider ethical challenges related to professional codes of conduct.
- The student explains how personal bias influences technology.
- Given an ethics-based scenario, the student identifies interventions to mitigate legal issues.
Scope
Develop custom selected response assessment items, according to WGU-provided
design documentation, using subject matter experts that meet WGU-provided
requirements. Items are written and validated by subject matter experts and
assessment is delivered in WGU-preferred format/platform.
Item Development:
- SME will produce Items that materially align to Customer evidence statements. A dichotomous scoring model will be used by Customer.
- All items will:
- Follow industry standard item writing practices
- Are consistent in format, grammatically correct, and free of misspellings
- Materially align with the CDD and evidence statements provided
- Adhere, where appropriate, to the item type recommendations provided in CDD
- Are not biased for or against any group, including those with disabilities
- Are original—Items are not to be recycled from previous or other work
- Are unique—Items are not variants of the same Items or clones
- May include enemy Items up to, however, no more than 10% of the entire Item bank
- Use the following item types: multiple choice, multiple select, matching, ranking/ordering
- Item images will be submitted consistent with the file type and image specifications outlined in the Item Development Handbook
- Formulas and calculations used in items will be provided in a Word document to Customer
- Item images and/or graphics will have a corresponding alt text
- To the extent applicable, Items will conform to the WGU Digital Accessibility Policy
All assessment items developed will follow the guidelines provided by the client and the learning design team. They are delivered to Customer in their final form and adhere to the criteria as described in Customer’s Item Development Handbook
- Originality and Permissions: For all text, images, diagrams, tables, and similar content (Components) incorporated into Items, SME will ensure that: (i) such Components are original creations such Components belong to the public domain or are available under an open license; or (iii) appropriate copyright or other permission has been secured for use of Components. In the case of original content. For unoriginal content, the SME will include appropriate citations for the source material.
- Item Review and Revision Expectations:
- Every Item to be developed will go through a review and validation process, which will be scheduled and facilitated by the Client and subject to the following requirements:
- Ease will review all items to ensure they materially conform to Customer standards as described in the Client Item Development Handbook.
- Feedback and/or required revisions from Ease will be sent back to the SME.
- Feedback and/or required revisions from Client will be sent back to the SME.
- Every Item developed by the SME will be delivered in its final form, as outlined in the delivery schedule provided by the Ease Project Manager.