There you need to read 2 page length article and answer 2 questions and answering 3 additional questiion about cybercrime.

Versio n 1, September 25, 2021 1

The following scenario has been taken from

Spiekermann, S. (2015). Ethical IT innovation: A value -based system design approach. CRC Press, pp. 22-26.

Please read the scenario on the future of work carefully. A scenario is a possible set of future events. All personas in the

scenario are invented and do not have similarity with real persons.

The following personas play a role in the scenario:

It is the year 2030. Stern has a really hard time waking up. “My life is a big mess,” he thinks to himself. As

he turns around in his bed, he knows that his bracelet has now signaled to the coffee machine to prepare

his morning café latte —a friendly nudge to get up and get going. But Stern does not feel like it at all today.

The last six months at his company United Games Corp. were pure hell for him, thanks mainly to an all -

star devil named Carly, who seems to get all the honor and attention top managemen t has to give. Shortly

after Carly joined the company, she and Stern were staffed together on a new company project. As United

Games recently bought a drone manufacturer, the company asked Stern and Carly to define an innovation Versio n 1, September 25, 2021 2

strategy around the new technology. In fact, United Games invested in technology for small

quadrocopters, flying vehicles of about half a meter in length that can be controlled by mobile phones,

remote computers, and even voice commands.

The conflict started when Carly suggested that they use a crowdsourcing approach to get people’s ideas

on qua drocopter use cases. This idea was not in Stern’s interest because he had anticipated the

acquisition and had a long -standing vision of what United Games could do to leverage the drone’s

business potential. In his view, his company should ramp up the drones and sell them to police forces. In

fact, Stern had a vision for how United Games could generally evolve to benefit from the highly lucrative

e-government market.

The powerful virtual re ality worlds United Games created were already a virtual training terrain for

military and police officers. So the contacts and sales channels would be there.

The quadrocopter purchase was now an ideal opportunity for United Games to sell drones to

municipalities, who would be looking to automate and replace some of their costly human interfaces

anyways.

But Carly had a completely different idea. To her, United Games was a gaming company, one that brought

people joy. That mission had brought her to t he company in the first place. So her idea was to market

drones to households. Drones could walk kids to school, look like fancy birds (colored in bright pink and

blue colors!), and have builtin communication capabilities for people to control them directl y through

voice commands. Carly said that the timing would allow United Games to be a pioneer in the market and

create a global voice -command standard for human –drone interaction. Drones could warn kids of

dangerous situations and send real -time video to p arents in case they wanted to see what their kids were

doing. They could be sent home to fetch stuff in case the kid had forgotten something. The drones would

be a bit like the owls from the Harry Potter movies but more beautiful and compliant. Stern thoug ht the

whole idea was completely girlish and ridiculous. What would his friends say if he told them over beer

that he would now go into the business of turning drones into parrots? “And how do you want to resolve

the incredible noise that drones are still making?” he said to Carly.

Stern’s opposition to Carly’s ideas caused their debate to turn vicious. Stern told his colleagues that Carly

was a “childish bitch” who did not have the necessary mindset to work for United Games. She did not

understan d the corporate identity of United Games, which they had worked to define for years. “OK, I

shouldn’t have used the word bitch,” Stern thought. But, in any case, he was mad after another

frustrating meeting with her.

The next time he walked into the meetin g room, he was greeted by her superior smile. “This lofty

attitude, this untouchable arrogance,” he told his buddies over lunch. “As if I was a child.” The meeting

went as bad as he had expected. But one bright spot from that meeting was that Carly suggest ed meeting

online next time to cheer themselves up a bit. So she came to visit him in his Galactic City facilities in the

Star Games VR. He spent a whole week preparing for the meeting, building a 3D simulation of what the

military drones could look like a nd how they could be controlled, including a business case and roll -out

strategy. “Anything to convince the lofty lady.” But Carly was not impressed. Instead, she invited him to

her virtual Star Games residence on planet Nanoo and had a VR simulation to sh ow him a Heidi -like girl

walking through the gardens with a fantasy drone that looked like an owl.

This was enough for Stern. He just felt that no professional means would ever make Carly see reason. And

so, while out on joint space flights in Star Games or meeting physically for beers, he started to tell his

long -time buddies in the company how he felt . “Enough is enough,” he said, “somehow Carly should leave

the company.” His buddies agreed. They also felt that Carly was pretty arrogant and a bit over the top.

They needed to find some way to cut her down to size. What about sending a military -style dro ne to her

Nanoo virtual residence while she was there? As a product manager, Stern had access to all accounts in

the game and could see where avatars were dwelling in real -time. It would be a great moment for Stern,

and it would be completely harmless beca use it would happen in the virtual world. Second, if Carly knew

the game well enough, she would be able to easily defend herself.

Finally, third, they would not have the drone shoot, just hover around her house. She would not know

their identities anyways. So Stern and his buddies put their plan into action, performing the attack on a

Tuesday evening and having a lot of fun doing it. Afterward, they met for beers and football to cool down

and celebrate their victory in the real world. But then hell started for Stern. The next day, his boss called

to ask about the progress on the drone project. His boss told him that he really liked Carly’s idea of Versio n 1, September 25, 2021 3

turning the drones into a nice household device. Pleasure and kids’ safety were great messages for the

markets, fitting United Games’ image well.

Two days later, United Games’ human resources (HR) officer dropped by Stern’s Galactic City premises by

surprise. First, he chatted about Stern’s recent attention scores. The company’s attention m anagement

platform had found that Stern’s attention span to his primary work tasks as a product manager was below

average. “You seem to be interrupting yourself too often” the HR representative had said. “But what

could I do?” thought Stern. There are simp ly too many messages, e -mails, social network requests, and so

forth that would draw on his attention. So he obviously did not match the 4 -minute minimum attention

span that the company had set as a guideline for its employees. Employees’ attention data wa s openly

available to the HR department and management in order to deal with people’s dwindling capability to

concentrate. Then the HR manager asked for the rest of the activity logs, the encrypted part. Stern felt a

bit awkward, but finally he decided that he had nothing to hide. So he handed over the secret key to his

data and allowed the personnel officer and his staff to analyze his behavioral logs on Star Games as well

as the logs taken in United Games’ real offic e space.

Encrypted work activity logging was part of United Games’ work terms and conditions for employment. In

fact, the integration of activity logging into work contracts in many companies was celebrated years ago

as a major achievement of the labor uni ons. The encrypted activity logging process came as a response to

a steep rise in burnout and workplace bullying, which seriously impacted companies’ productivity and

damaged people’s health, mental stability, and well -being. A compromise on the mode of surveillance

was struck between unions and employers. Prior to these negotiations, employers had conducted video

surveillance in a unidirectional way that undermined employees’ privacy while providing no benefits to

them. As part of the new process, employee activities and conversations would be logged in all rooms as

well as VR facilities and stored in an encrypted way under the full control of employees (in their personal

data clouds). With this system no one, not even the CEO of the company, could view the original data.

However, when a security incident happened, employees were informed and asked to share their data. In

particular, though, when serious cases of burnout or bullying occurred, employees themselves could

initiate a process of data analysis, ha nding over their secret key so that a designated representative could

recover their data, text, and voice streams, and perform a conflict analysis. Data -mining technology would

then look for patterns of behavior typical for mobbing or burnout as well as co gnitive and emotional

states. The streams could also be used to replay specific situations in which conflict had occurred.

However, these replays would occur only in the presence of a trained coach or mediator. This practice had

not only reduced bullying in recent years but also helped employees to better understand their own

communication patterns and behavior. Finally, the e ncrypted data was also used to extract aggregated

heat maps of the company’s general emotional state. This practice helped upper management to better

grasp the true emotional “state of their corporate nation.”

Carly had handed in her secret key and initiat ed an inquiry into the attack on her Nanoo home. So this

was what Stern was to confront today. “Perhaps I have gone a bit too far,” he wondered. “But it is

something totally normal for the Star Games anyway.” After all, the idea of the drone attack had com e

from another colleague of his.

Stern slowly walks up to the kitchen. His café latte is not as hot he likes it, and the machine has not put as

much caffeine as usual into his cup due to his raised emotional arousal. But never mind. He turns on his

Roomba vacuum cleaner, which always cheers him up in the morning by roving around the apartment

making some funny sounds, just like a maybug in the virtual world would do. “Perhaps a girlish drone owl

isn’t that bad after all,” he thinks. “For sure, I need to offer something to end the war now, anyways.”

a. Create a mindmap of the ethical values touched by the attention management platform of United Games. As part

of the mindmap, mark in keywords why these values are affected.

b. Argue which advantages and drawbacks a virtual reality working environment such as the described Star Games

VR could have for employees of United Games. Versio n 1, September 25, 2021 4

2. Cybercrime Case

You are working as a security manager for “AIWork”, a tech -company that develops AI algorithms to match freelancers with

companies looking for bright talents. Recently, 2 employees in the accounting department of AIWork received the following

e-mail:

From : IBM Accounting

To: Maria Ivanova < [email protected]> , Peter Woodstone < [email protected]>

Subject: Update of bank account information

Dear Sir or Madame!

Our bank account information has changed. Please update the following information in your accounting system:

IBAN: LT78 5678 1234 8467 3457

BIC: SHADESWXXX

Thank you and best regards,

Dunkan Trudeau

IBM Accoun t Manager

a. Develop a plan of measures to protect AIWork from potential damage in relation to such e -mails.

Unfortunately, despite your plan of measures, one of the AIWork accountants has initiated and authorized a money

transfer of 5.367,18 EUR to the above bank account.

b. Which law enforcement agency in Austria would be competent to report this incident to?

c. Which other steps to additionally take after the incident do you recommend to the CEO of AIWork?

(min. 300 words)