An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.

Slides:



Advertisements
Similar presentations
Implementing the Tech Standards Presenter: Eric Curts eTech|OHIO Tech Conference 2006.
Advertisements

Method & Methodology How to do research How to work out how to do research How to work out how to work out how to …
Social-pedagogic Eyes in the Midst of Diverse Understandings, Conceptualisations and Activities Sligo, May 24-25, 2012 Prof. Juha Hämäläinen University.
TRAINING OF TEACHING STAFF FOR PEDAGOGICAL ACTIVITY ON THE BASIS OF I
A Personal Teaching Philosophy. A statement of beliefs and attitudes relative to: purpose of education & role of teacher definition of teaching nature.
What Is Philosophy?. The Definition: Philosophy is… a study of ideas about human nature in relation to the reality in which we live. a study of ideas.
General Studies Areas Core Areas –Literacy & Critical Inquiry (L) –Mathematical Studies (MA/CS) –Humanities & Fine Arts (HU) –Social & Behavioral Sciences.
Chapter 15: Making Decisions about Computers, Information, and Society Invitation to Computer Science, Java Version, Third Edition.
Integrating Writing in the Statistics Curriculum 1 Dean Poeth and Jane Oppenlander Union Graduate College eCOTS, May 19-23, 2014.
EVAL 6000: Foundations of Evaluation Dr. Chris L. S. Coryn Nick Saxton Fall 2014.
Cyber Education Project Accreditation Committee November 2014.
Shameicha Wade Curriculum Specialist. What is An Essential Question?
Introduction to Student Learning Outcomes in the Major
Computer Ethics Overview Gordon College. Introduction  Computer ethics is growing and changing as computers are growing and changing growing and changinggrowing.
Rationale for CI 2300 Teaching and Learning in the Digital Age.
Meaning and Scope Chapter 1.
Chapter Copyright© 2004 Thomson Learning All rights reserved 15 Managing Ethical and Social Responsibility Challenges in Multinational Companies.
The Goals and History of Science Education Chapter 4 The Goals and History of Science Education.
 Explores theoretical questions concerning the nature of the mind, knowledge, and mental phenomena. Examines the nature of knowledge, creativity, the.
Confidence, mathematics and performance of Engineering Studies candidates at the New South Wales Higher School Certificate examination John Barlow Australian.
THE NEW TEXAS CORE CURRICULUM (OCTOBER 27, 2011).
A First Course in Information Security
Franklin University Dr. Lewis Chongwony, Instructional Designer
Department of Physical Sciences School of Science and Technology B.S. in Chemistry Education CIP CODE: PROGRAM CODE: Program Quality Improvement.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
Welcome to AS Level Philosophy and Ethics!. Who am I? And more importantly…. Who are you??
Core Curriculum and Transfer Students Summer 2015.
HCI Yonsei University, Korea The Role of Human Computer Interaction (HCI) in the Information Systems (IS) Curriculum Jinwoo.
Philosophical Roots of Education
Laying the Groundwork: Philosophy
Becoming a Teacher Ninth Edition
IL Step 1: Sources of Information Information Literacy 1.
Process Skill demonstrate safe practices during laboratory and field investigations.[AST.1A] October 2014Secondary Science - Astronomy.
HZB301 Philosophy Room 158 Mr. Baker.
 Examines the nature of culture and the diverse ways in which societies make meaning and are organized across time and space. Topics include cultural.
Copyright © 2007 Allyn and Bacon BECOMING A TEACHER, 7e Chapter 3 Developing a Teaching Philosophy.
Incorporating Cybersecurity Education into the CS curriculum Stephen Cooper, Stanford University.
Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity for Critical Infrastructure Workshop Summary May 3, 2013 Support for.
POLITICAL PHILOSOPHY MR D. SCHOLTZ. WHAT WILL YOU BE STUDYING? WHAT IS POLITICAL PHILOSOPHY ALL ABOUT?
Ethics, Health, Communication Dialog The core challenge of bioethics.
Advanced Psychology Lab: Research Methods in Personality Psychology R. Chris Fraley
Professional Ethics in Software Engineering Curricula Gordana DODIG-CRNKOVIC Ivica CRNKOVIC Department of Computer Science and Electronics, Mälardalen.
Chapter 1 Defining Social Studies. Chapter 1: Defining Social Studies Thinking Ahead What do you associate with or think of when you hear the words social.
Match the word with the definition.  ___ Epistemology  ___ Ethics  ___ Metaphysics  ___ Logic  ___ Teleology,  ___ Deontology,  ___ virtue theory.
Stage-426-Feb-991 Ways to Excel as a Stage-4 Student Professor Clark Thomborson Computer Science Department Auckland University.
ANIE IE Research Workshop Objectives towards a Curriculum Development University of Pretoria July 4-5, 2011 Rafael Capurro International Center for Information.
Welcome to Psychology 350 Research Lab in Personality Psychology web page:
N O The Standard Course Level Approach to Assessment of General Education DCC General Education Characteristics Writing Skills Oral Communications Analytical.
© 2007, Educational Institute Chapter 17 Ethics in Hospitality Management Hospitality Today: An Introduction Sixth Edition (103TXT or 103CIN)
1 THE DESIGN OF INTELLECTUAL MOVEMENTS Stuart Umpleby The George Washington University Washington, DC.
Session 6 Preparing for Block 1. CURRICULUM FOCUS GRADES 9 – 12: SOCIAL SCIENCES & HUMANITIES.
Introduction to Philosophy. Instructor: Darren Hudson Hick SKN 1106Office Hours: Tu/Th 2:00-3:00pm Teaching Assistants: Michael Cifone 0104, 0106, 0107.
Lecture # 32 SCIENCE 1 ASSOCIATE DEGREE IN EDUCATION Professional Standards for Teaching Science.
NOVA Evaluation Report Presented by: Dr. Dennis Sunal.
Science Department Draft of Goals, Objectives and Concerns 2010.
Graduate Program Completer Evaluation Feedback 2008.
Review to Date… November 8, What is literacy? We defined literacy and different types of literacy on the web. We also defined this in class We did.
PHL 464 CART Education Expert/phl464cart.com FOR MORE CLASSES VISIT
Computer Ethics Current and Future Research Areas.
Computational Reasoning in High School Science and Math
Research Lab in Personality Psychology
Chapter 20 The Sport Humanities.
Philosophy of Education
SOC 120 Education for Service-- snaptutorial.com.
SOC 120 Teaching Effectively-- snaptutorial.com
Meaning and Scope Chapter 1.
Information Technology (IT)
Dr. James P. Lawler Dr. John C. Molluzzo
Computer Science Section
Presentation transcript:

An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems

Background Ethics at Xavier Ethics at Xavier A major part of strategic planA major part of strategic plan New Center for Business EthicsNew Center for Business Ethics Movement to integrate ethics into curriculumMovement to integrate ethics into curriculum Ethics in Business / Computing Ethics in Business / Computing Obviously, major focus in recent business newsObviously, major focus in recent business news Increasingly important subject in computingIncreasingly important subject in computing

History of Computer Ethics Dates to post WWII era Dates to post WWII era “social potentiality of unheard–of importance for good and for evil.”“social potentiality of unheard–of importance for good and for evil.” 1960s and 70s 1960s and 70s Impact of computers on society recognized but few inroads into academicsImpact of computers on society recognized but few inroads into academics 1973: first ACM code of ethics 1973: first ACM code of ethics 1985: “Computer Ethics” first major textbook 1985: “Computer Ethics” first major textbook 1980s to present – numerous courses, research centers, conferences, journals, etc. on topic 1980s to present – numerous courses, research centers, conferences, journals, etc. on topic

Computer Ethics in Academia Evolved from many different subject areas Evolved from many different subject areas Philosophy, Computer Science, Communications, Law, Information Systems, Telecommunications, and othersPhilosophy, Computer Science, Communications, Law, Information Systems, Telecommunications, and others Wide range of approaches and content Wide range of approaches and content Inconsistent content even within discipline Inconsistent content even within discipline Examples: ISWorld sample syllabus vs. NC State contentExamples: ISWorld sample syllabus vs. NC State content

CyberEthics: Miss. State PHILOSOPHY Define ethics and how it fits into philosophical thought. Define ethics and how it fits into philosophical thought. Describe the fields of philosophy: Describe the fields of philosophy: Metaphysics, epistemology, value theory, aesthetics, logic.Metaphysics, epistemology, value theory, aesthetics, logic. Define "second order" inquiries in the field of philosophy. Define "second order" inquiries in the field of philosophy. Define the terms "rational" and "critical" as they concern philosophical thought. Define the terms "rational" and "critical" as they concern philosophical thought. Contrast the speculative and analytic approaches to philosophy. Contrast the speculative and analytic approaches to philosophy. Compare and contrast science and philosophy. Compare and contrast science and philosophy. Compare and contrast "idealism” and “materialism” Compare and contrast "idealism” and “materialism”MORALITY Define "morality". Define "morality". Explain the following challenges to Morality: Explain the following challenges to Morality: 1. Logical positivism. 2. Relativism. 3. Existentialism. 4. Determinism. Define Teleology. Define Teleology. Compare and contrast the teleological viewpoints of hedonism and utilitarianism. Compare and contrast the teleological viewpoints of hedonism and utilitarianism. Define Deontology. Define Deontology. Compare and contrast teleological and deontological ethical Compare and contrast teleological and deontological ethical

Ethics in Computing: NC State

Computer Ethics Teaching Resources Several Textbooks… however: Several Textbooks… however: Some outdatedSome outdated Collections of articlesCollections of articles Not oriented toward business studentsNot oriented toward business students Many web sites, articles, etc. Many web sites, articles, etc. Need for better course materials, consistency of ethics content across courses within disciplines Need for better course materials, consistency of ethics content across courses within disciplines

Course Profile: MBA Course in Ethics, Privacy & Security

Ethics has no place in a business school. Ethics is for fools and babies. Money is the only measure of business success. - Business School Dean

Buckman Laboratories Buckman Laboratories Founder’s Attitude toward ethics Founder’s Attitude toward ethics Credits Code of Ethics with KM Implementation SuccessCredits Code of Ethics with KM Implementation Success

Rationale HIPAA as a model HIPAA as a model Of the future of IT Of the future of IT Of an application with direct human affect Of an application with direct human affect Of the need for interaction between Ethics, Privacy and Security Of the need for interaction between Ethics, Privacy and Security

As long as I’m not breaking the law, I don’t care who sees my information – I have nothing to be afraid of. -MBA Student(s) Area for further research

Privacy As a personal issue As a personal issue As a legal issue As a legal issue Include constitutional discussionInclude constitutional discussion As an IT issue As an IT issue As an ethical issue As an ethical issue

Other Ethical Issues Identity Theft Identity Theft Disinformation and Misinformation Disinformation and Misinformation VR VR AI AI Equity of Access Equity of Access Games, Violence, Sex and Behavior Modeling Games, Violence, Sex and Behavior Modeling Government and Legal Government and Legal Medical and Scientific Impact Medical and Scientific Impact Send for list of resourcesSend for list of resources

Security Threats Threats HackersHackers VirusesViruses TrojansTrojans DOS attacksDOS attacks attack techniquesattack techniques Defenses Defenses EncryptionEncryption Virus detectionVirus detection BiometricsBiometrics Intrusion DetectionIntrusion Detection FirewallsFirewalls

Pedagogy Instructor Presentations Instructor Presentations Contemporary Readings Contemporary Readings Individual Research and Presentations Individual Research and Presentations Professional Guest Speakers Professional Guest Speakers Resources Resources

Conclusion A changing topic A changing topic Courses vary widely Courses vary widely A review and a new idea A review and a new idea Unlikely to develop a comprehensive set of topics Unlikely to develop a comprehensive set of topics Area could use further definition and organization Area could use further definition and organization Further research into pedagogical approaches is needed. Further research into pedagogical approaches is needed.

Invitation Who is offering (a) course(s) in IT Ethics Who is offering (a) course(s) in IT Ethics Who is offering (a) course(s) in EPS Who is offering (a) course(s) in EPS Who is interested in offering (a) course(s) in IT Ethics or EPS Who is interested in offering (a) course(s) in IT Ethics or EPS Topics, pedagogy, results Topics, pedagogy, results

Questions?