Computer Ethics in Information Technology

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Social and Ethical Implications CMSC 101 November 21, 2013 Bhuvana Bellala and Marie desJardins.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Today we will: Be introduced to the Unit 3 assignment sequence;
COMP427 Assignment Prepared By Joseph Leung. Guideline For Assignment 1  Choose your article from the following topics : Digital divide Privacy Intellectual.
5.1 © 2006 by Prentice Hall Ethical and Social Issues in the Digital Firm.
MSIS 110: Introduction to Computers; Instructor: S. Mathiyalakan1 Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Title of Book Author Anita Sego. Information About Book When was it written? Who published it? What other books has the author written?
COMPUTER ETHICS & COMPUTER HACKING. Introduction Ethics is the branch of philosophy that involves systemizing, defending and recommending concepts of.
How to Write an Editorial. Editorial ed·i·to·ri·al /edə ˈ tôrēəl/ noun a newspaper article written by an editor that gives an opinion on a topical issue.
Computer ethics.
DELETE: THE VIRTUE OF FORGETTING IN THE DIGITAL AGE By Viktor Mayor-Schonberger.
Thesis Statements What the?. 1-2sentence statement that condenses the whole argument or analysis. Eg. News Articles Tests your ideas by distilling them.
CS 415 Social Implications of Computing Coordinator: Leo Finkelstein, Jr. Course Review.
CS300 Computers in Society Web- based course Rekha Gupta.
Search and Use of Information among Computer Science and Information Technology Undergraduates Mohd Sharif Mohd Saad Faculty of Information Management.
Writing Workshop for ECS 15 David Masiel WAC Coordinator University Writing Program
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Code of Ethics -What is the code of ethics?
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
Teaching Media Ethics in the General Education JOUR 110 Introduction to Mass Communications Course Ethics Across the Curriculum Project by Raul Reis, CSULB.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC Department of Computer Science and Electronics, Mälardalen.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Class Expectations Educational Finance EAD 951A. Attendance/Participation u Students are expected to attend class, arrive on time, to actively participate.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
By: Barbara Mackessy For Diagnostic Services Portfolio.
Classroom Project CAGS Workshop Alaska, Research/Education Needs to address –AIM, –CloudSat, –GLOBE –Education Standards –Your curriculum.
Beyond Our Borders: A Global Perspective on Technology Beverly Amer Orlando, Florida March 17, 2011.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Intervention for Chronic and Emergency Exposure Situations Assessment and Response during Nuclear Emergency Protective Action Decision Making for Severe.
ARGUMENTATIVE WRITING: ESTABLISHING A POSITION ON A TOPIC AND USING RELEVANT, SOURCE-BASED INFORMATION TO SUPPORT YOUR STANCE. HOW IS ARGUMENTATIVE WRITING.
IT’S ALIVE!!. or is it??? Are viruses alive ? –How can you tell if something is alive? –What would your evidence be or look like?
HACKERS: HEROES OF THE COMPUTER REVOLUTION 25 TH ANNIVERSARY By: Brett Delaney Living in a Networked World: The Good, the Bad, and the Ugly CS 408 Section.
CISB 412 Social and Professional Issues Final Discussion.
Principles of Information Systems, Sixth Edition Security, Privacy, and Ethical Issues in Information Systems and the Internet Chapter 14.
ETHICS IN USING COMPUTER
Digital Law Issues: Introduction to Copyright and Fair Use By Louise Fechter.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Professional Ethics and Responsibilities Part-II
Research Strategies Dr. Ramchandran Sethuraman Long Beach City College The ideas for the Powerpoint presentation are drawn and used with permission from.
RES 320 expert Expect Success/res320expertdotcom FOR MORE CLASSES VISIT
Creationism Views Essay Total point value= 75 pts.
EDL 531 Week 1 Individual Code of Ethics Graphic Organizer To purchase this material click below link Week-1-Individual-Code-of-Ethics-Graphic-Organizer.
Solutions of Case Study 4 & 6
This Week’s Agenda Types of Research Papers Types of Research studies
Ethical, Social, and Political Issues in E-commerce
Please read the entire presentation.
Training Presentation
Using the new ACM code of ethics in decision making
COM 600 Competitive Success/snaptutorial.com
MFCC 551 Competitive Success/snaptutorial.com
COM 600 Education for Service-- snaptutorial.com.
MFCC 551 Education for Service-- snaptutorial.com.
ACCT 540 Education for Service/tutorialrank.com
PHL 320 Week 1 Apply: Decision-Making Career Path Plan //Download Your Course Here:
COM 600 Teaching Effectively-- snaptutorial.com
MFCC 551 Teaching Effectively-- snaptutorial.com.
Applications Software: End User Applications
فلوشیپ اخلاق زیست پزشکی استادیار دانشگاه علوم پزشکی ایران
Ethical Use of Computers
Training Presentation
Training Presentation
COMPUTER ETHICS & COMPUTER HACKING
Presentation transcript:

Computer Ethics in Information Technology Course Code: IT 113 No. of Hours: 5 Course Goals: At the end of the course, students will understand the ethical issues facing them as IT professionals. They will be able to analyze situations involving ethical conflicts and will be able to make decisions based on professional codes of ethics.

Major Topics Covered in the Course: What is Computer Ethics Professional Ethics Software Theft Property Rights in Computer Software Computers and Privacy The Invasion of Privacy Crime, Abuse, and Hacker Ethics

Major Topics Covered in the Course: Computer Crime Hacking and Viruses Responsibility and Liability The Social Implications of Computers: Autonomy and Access ACM Code of Ethics and Professional Conduct IEEE Code of Ethics

Assignments Write a short essay (roughly 300 words) about some topic related to computing and/or the Internet that interests you and has social or ethical implications. Describe the background; then identify the social or ethical issues, problems, or questions that you think are important. (Don't make your essay be just an argument for one point of view. You may express your views if you want to, but first explain what the issues are, why there is a problem or a controversy.) Collect news articles, from print or electronic sources, on (1) benefits and valuable applications of computer technology and (2) failures and/or problems caused by computer technology. The articles should be current, that is, published during this time period. Write a brief summary and commentary on two articles in each category indicating how they relate to topics covered in this book.