CISB 412 Social and Professional Issues Final Discussion
Assessments 1.Final Exam 50% 2.Mid-Term Test/ Quizzes 20% 3.Assignment/Presentation 30% Assignment : To be submitted through a blog 1.Introduction to team members 2.Assignment Part 1 - Monday week 6, by 5 PM 3.Assignment Part 2 - Monday week 11, by 5 PM 4.Additional Task – answering questions week 14, by 5 PM
Assignment (recap) 4 parts (entries) – Intro to group members (5 marks) – Part 1 : Academic paper & presentation (20 marks) – Part 2 : The ACM sketch (20 marks) – Part 3 : ongoing tutorial tasks (15 marks) Total of 60 marks - contributing to 30% of overall marks
Final Task Answer the following questions as the final entry in your blog. To be completed by week 14 1.In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights. 2.Explain Identity Theft and provide example to support your answer 3.Describe 5 types of software piracy 4.Explain the two types of digital divide
Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks distribution before you start answering – E.g. identify the four types and explain each one’s benefits [10 marks]
Learning Outcomes At the end of this course, the student should be able to: Use and appreciates the ethical theories as tools to analyse moral problems Discuss issues related to the introduction of Information Technology into society Explain the ethical implication of Information Technology and Internet to intellectual property, privacy, lifestyle, work, wealth, and health. Be aware of the vulnerability of networked computers Be acquainted with selected professional codes of conducts
Learning Outcomes – Explain ethics, compare it with etiquette
Learning Outcomes – Describe and compare the frameworks/ethical principles that can be used for moral decisions
Learning Outcomes – Identify issues that come with networking especially the use of world wide web.
Learning Outcomes – Identify intellectual properties issues that come with the use of Information Technology
Learning Outcomes – Explain the perspectives of privacy
Learning Outcomes – Describe ways privacy can be compromised through the usage of technology
Learning Outcomes – Identify and describe the need for professional code of ethics
Learning Outcomes – Describe whistleblowing from the stance of organization and moral
Learning Outcomes – Discuss how Information Technology and automation affect workplace
Learning Outcomes – Discuss the changes in workplace and the impact to the society
Learning Outcomes – Apply the ethical principles on the issues to establish morality of the action
Chapter 2 Key Terms Society Ethics Etiquette Subjective Relativism Cultural Relativism Divine Command Theory Kantianism Act Utilitarianism Rule Utilitarianism Social Contract Theory
Chapter 3 Key Terms – SPAM – Pornography – Web Filters – Identity theft – Online Predators – Internet Addiction
Chapter 4 & 5 Key Terms – Intellectual Property – Copyrights – Patents – Trademarks – Trade secrets – Software Piracy – Softlifting, Uploading & Downloading, Software Counterfeiting, OEM, Hard disk loading, Renting – Licensing – Freeware, Free Software, Shareware, Nagware, Crippleware etc
Chapter 6 Key Terms Privacy Public Record Public Information Personal Information Types of information disclosure – statutory, involuntary, voluntary Data mining Ownership of transaction info – opt-in, opt-out Dumpster diving, shoulder surfing (low tech info theft) Encryption
Chapter 7 Key Terms Professional society whistle blowing
Chapter 8 Key Terms Telework Workplace monitoring Video surveillance
Questions?