Chapter 16 – Careers in Information Technology

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
Chapter 1: The Context of SA&D Methods
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
IT Predicted Job Growth. Hiring of IT Personnel Today More and more, organizations are looking to hire IT personnel with a 4-year degree – IT degree or.
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
For Students. What is Copyright? “The exclusive right to produce or reproduce (copy), to perform in public, or to publish an original literary or artistic.
What Is Computer Ethics?
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 9-1 ACS 1803 Lecture Outline 15 ETHICS AND COMPUTER CRIME.
Copyright © 2014 Pearson Education, Inc. 1 Managers are facing unique challenges as Digital Technologies permeate the workplace Chapter 1 - Managing in.
Computer Ethics Christina McCorkle.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Ethics, Computing, and the Internet
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
Ethical Implications In The Age Of Information
 byte  short  int  long  float  double  boolean  char.
ETHICS IN USING COMPUTER
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
INFORMATION TECHNOLOGY ETHICS INFORMATION TECHNOLOGY ETHICS.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Computers Are Your Future Twelfth Edition
Note addresses of authors: Floridi – Faculty of Philosophy
Computers: Tools for an Information Age
The Legal System and Ethics in Information Security
GEC 0113 Ethics in IT Practices
Chapter 1 - Introduction to Information Technology
Unit 3- Introduction to Computer Ethics
Technology, Careers, and Job Hunting
Introduction to Computer Ethics
Introduction to Computer Ethics
Computer Ethics.
Standard 6: Educational Leaders understand the social, legal, and ethical issues related to technology and model responsible decision-making related to.
Presentation transcript:

Chapter 16 – Careers in Information Technology CMIT100 Chapter 16 – Careers in Information Technology

Learning Objectives Discuss careers in IT. Describe forms of continuing education in IT. Introduce social concerns related to IT. Discuss ethical conduct in the IT field.

IT Career Job Growth Projections

IT Specialties Network Administration System Administration Web Administration Database Administration Computer Support Specialist IT Management

Related Careers Computer Forensics Web Development Programmer/Software Engineer Information Systems Computer Technician Project Management

LAB Job Search

IT Ethics Do not use a computer to harm other people. Do not interfere with other people’s computer work. Do not snoop around in other people’s computer files. Do not use a computer to steal. Do not copy or use proprietary software for which you have not paid. Do not use other people’s computer resources without authorization or proper compensation. Do not appropriate other people’s intellectual output. Think about the social consequences of the program you are writing or the system you are designing. Always use computers in ways that insure consideration and respect for fellow humans.

IT Ethics Privacy Ownership Control Accuracy Security

Social Considerations Digital Divide Computer-related Health Problems Maintaining Privacy and Safety Digital Litter Internet Addiction Obscenity and Censorship

IT Policies The role that IT plays in the company Proper employee usage of IT The employee’s rights to privacy (if any) Proper usage of data Security and privacy of data Ownership of ideas developed through IT in the company (intellectual property) How the company handles copyright protection issues

Continual Learning Changing technology and business requirements Expanding to new specialties

Creative Commons Statement