GE Course Outline IT and Ethics. What this course is about?  This course is about understanding what people should or shouldn’t do on a computer and.

Slides:



Advertisements
Similar presentations
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Advertisements

Facebook Presented by: Keystone Computer Concepts.
The key aim for the week is: To ensure children are able to recognise and challenge bullying behaviour wherever it happens - whether face to face or in.
Computers in Principle & Practice I - V Deena Engel Computers in Principle and Practice I V , Sections 1 & 2 Fall, 2009 Deena Engel .
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
Understanding and Building Basic Networks Chapter 3 The Other Internet.
Course Overview CSCI 327 Social Implications of Computing.
Are you being a safe and successful digital citizen?
. 4.1 Understanding ethical and social issues related to systems. 4.2 Ethics in an information society. 4.3 The moral dimensions of information systems.
Teenangel Gabriella. AIM is an instant messaging system. You have to be thirteen years old to use AIM. Besides sending messages, AIM is also used to tell.
The audio will be turned on just before our start time at 7:00 pm ET.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
Arif Fazel School of Molecular and Cellular Biology Academic Advisor IlliAAC Conference 2012 December 14, 2012 Tweet Us, Like Us, Watch US! MCB Goes Viral.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
James Tam CPSC 203: Introduction To Computers (Independent Study) James Tam.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Staying Safe Online A Practical Guide for Middle School Students.
Ethical Issues in Computer Science (slides modified by Erin Chambers)
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
CJ 100 UNIT # 1 WELCOME TO CLASS AND TO KAPLAN UNIVERSITY! YOUR COURSE INSTRUCTOR IS Kelly Boone.
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Introduction to Humanities Computing Spring 1999.
Electronic Marketing: Integrating Electronic Resources into the Marketing Process, 2e 11/5/2015  2004 Joel Reedy and Shauna Schullo Electronic Marketing.
1 Technologies for Electronic Commerce and EBusiness Walt Scacchi, Ph.D. FEMBA 290 Winter 2003.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Technical Orientation Summer Technical Orientation Session starts at 2:00 pm – We’ll be online shortly – Speaker test starts about 1:45 pm To ask.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
Every student you have, just like any citizen in the United States, has a right to privacy  An ethical issue that arises when an individual’s right to.
Are you a Digital Native?
OCTAVIA’S PRESENTATION ON WEEBLY WHAT IS WEEBLY? A free website that allows individuals to build a free website. As of 2012 weebly hosts over 20 million.
How to Select and Use Privacy Settings EL Civics Assessment Task 3.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
StopPreviousNext Vicnet Internet training course Workbook 11 Introduction to Facebook Easy English workbook August 2011.
Chloe Hutton. Mobile phones are a very popular piece of technology and its main use is to contact people either through ringing people up or texting.
IT’S OUR FAVORITES!! Delicious: It’s What’s for Dinner.
CISB 412 Social and Professional Issues Final Discussion.
EDEXCEL BTEC INFORMATION & CREATIVE TECHNOLOGY Unit 1 – The online world.
E-SAFETY. LYNDON B. JOHNSON (FORMER US PRESIDENT) “Every man (sic) should know that his conversations, his correspondence, and his personal life are private.”
DIGITAL CITIZENSHIP TRAINING BEING A SAFE AND SUCCESSFUL USER OF ICT.
1 1.Log in to the computer in front of you –Temp account: 210class / 2.Update your in Cascadia's system –If I need to you I'll use.
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
Christian Citizenship in a Digital World Lesson 1: Online Privacy.
October 2010, Week 1INFO2009 Professional and Legal Issues Professional and Legal Issues Module Overview INFO2009 (Professional and Legal Issues)
INTE 290 Summer 2015.
June 16INFO2009 Professional and Legal Issues Professional and Legal Issues Week INFO2009 (Professional and Legal Issues) Su White (saw)
Financial Management of ECE Programs.  Go to “Tools”  Click on “Personal Information” to edit your personal information (including address) or.
Math 1316 Prof. Thomas Jay. Homework: Homework problems are designed to reinforce the lecture/reading. If you miss a class, you should attempt to do.
Debra Mann Reference Librarian Innisfil Public Library
How to stay safe using the internet & App’s
How to stay safe using the internet and app’s?
Your Responsibilities
Legal, Ethical and Ownership issues
Freedom Independence Transition
CSCI 327 Social Implications of Computing
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Social Media and Mental Health
BRAIN PART status update
Web 2.0 Technologies and Community Building Online by
Ethical, Legal, Cultural and Environmental Concerns
How to Select and Use Privacy Settings
STAYING SAFE ON THE INTERNET
How to succeed in my course, part 1
Social Media and Mental Health
Presentation transcript:

GE Course Outline IT and Ethics

What this course is about?  This course is about understanding what people should or shouldn’t do on a computer and the controversies and debates behind these issues.  This course aims at exploring these issues, through in-class discussions and debates, to show different points of view.

What this course is about?  The course will cover case studies and basic legal and privacy aspects of IT use.  Topics may include basic concepts, such as software licenses to copyright infringements, file-sharing, free speech concerns, computer crimes, date privacy, etc.

What this course is about?  The course prepares students to behave in acceptable ethical manner when using IT in the workplace

CILOs 1.Explain key concepts of IT ethics 2.Explain ethics-related issues, such as copyrights, licenses, privacy and be able to debate on different viewpoints of these issues 3.Develop a better sense of IT ethics and acceptable behaviour for professionals

Format  3-hour lecture/tutorial  Student blog presentations  Weekly formal debates  Semester-long project progress  Lectures/discussions  Assessment:  70% Coursework  30% Exam

Assessment Details  Blog (10%)  Self-reflective journal (5%)  Class participation/debates (15%)  Presentations (10%)  Final Report (30%)  Final Exam (30%)

Weekly Topics  A different topic/issue will be explored and debated each week.  Realistic scenarios are created to help students related easier to the IT ethics issues being discussed

Scenarios for Discussion  “I’m a student working part-time at CityU admissions office and I have access to tons of personal contact information. Is it okay for me to give the info to my friend who is selling life insurance?”  “If we send secret (encrypted) messages to friends, should the Government be allowed to decrypt my messages without me knowing?”

Scenarios for Discussion  “We basically depend on computer software for everything. Should we have guarantees that it is safe and accurate?”  “Your best friend just bought a cool new computer game. Why not just make a copy for yourself?”  “I bought a new CD with really cool songs. Why can’t I rip it and share it with my friends on the Internet?”

Scenarios for Discussion  “Why can’t I post nude photos (pornography) on my website? Isn’t that freedom of speech?”  “My hacker friend just helped me erase my nemesis’ facebook page. How cool is that?”  “With my friend’s date of birth and address, I can easily set up an account to impersonate him. Won’t that be fun?”

Scenarios for Discussion  “Whenever no one’s watching, I surf the web and watch Youtube videos during work. Having fun and getting paid. Isn’t it cool?”