Presentation is loading. Please wait.

Presentation is loading. Please wait.

An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.

Similar presentations


Presentation on theme: "An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems."— Presentation transcript:

1 An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems

2 Background Ethics at Xavier Ethics at Xavier A major part of strategic planA major part of strategic plan New Center for Business EthicsNew Center for Business Ethics Movement to integrate ethics into curriculumMovement to integrate ethics into curriculum Ethics in Business / Computing Ethics in Business / Computing Obviously, major focus in recent business newsObviously, major focus in recent business news Increasingly important subject in computingIncreasingly important subject in computing

3 History of Computer Ethics Dates to post WWII era Dates to post WWII era “social potentiality of unheard–of importance for good and for evil.”“social potentiality of unheard–of importance for good and for evil.” 1960s and 70s 1960s and 70s Impact of computers on society recognized but few inroads into academicsImpact of computers on society recognized but few inroads into academics 1973: first ACM code of ethics 1973: first ACM code of ethics 1985: “Computer Ethics” first major textbook 1985: “Computer Ethics” first major textbook 1980s to present – numerous courses, research centers, conferences, journals, etc. on topic 1980s to present – numerous courses, research centers, conferences, journals, etc. on topic

4 Computer Ethics in Academia Evolved from many different subject areas Evolved from many different subject areas Philosophy, Computer Science, Communications, Law, Information Systems, Telecommunications, and othersPhilosophy, Computer Science, Communications, Law, Information Systems, Telecommunications, and others Wide range of approaches and content Wide range of approaches and content Inconsistent content even within discipline Inconsistent content even within discipline Examples: ISWorld sample syllabus vs. NC State contentExamples: ISWorld sample syllabus vs. NC State content

5 CyberEthics: Miss. State PHILOSOPHY Define ethics and how it fits into philosophical thought. Define ethics and how it fits into philosophical thought. Describe the fields of philosophy: Describe the fields of philosophy: Metaphysics, epistemology, value theory, aesthetics, logic.Metaphysics, epistemology, value theory, aesthetics, logic. Define "second order" inquiries in the field of philosophy. Define "second order" inquiries in the field of philosophy. Define the terms "rational" and "critical" as they concern philosophical thought. Define the terms "rational" and "critical" as they concern philosophical thought. Contrast the speculative and analytic approaches to philosophy. Contrast the speculative and analytic approaches to philosophy. Compare and contrast science and philosophy. Compare and contrast science and philosophy. Compare and contrast "idealism” and “materialism” Compare and contrast "idealism” and “materialism”MORALITY Define "morality". Define "morality". Explain the following challenges to Morality: Explain the following challenges to Morality: 1. Logical positivism. 2. Relativism. 3. Existentialism. 4. Determinism. Define Teleology. Define Teleology. Compare and contrast the teleological viewpoints of hedonism and utilitarianism. Compare and contrast the teleological viewpoints of hedonism and utilitarianism. Define Deontology. Define Deontology. Compare and contrast teleological and deontological ethical Compare and contrast teleological and deontological ethical

6 Ethics in Computing: NC State

7 Computer Ethics Teaching Resources Several Textbooks… however: Several Textbooks… however: Some outdatedSome outdated Collections of articlesCollections of articles Not oriented toward business studentsNot oriented toward business students Many web sites, articles, etc. Many web sites, articles, etc. Need for better course materials, consistency of ethics content across courses within disciplines Need for better course materials, consistency of ethics content across courses within disciplines

8 Course Profile: MBA Course in Ethics, Privacy & Security

9 Ethics has no place in a business school. Ethics is for fools and babies. Money is the only measure of business success. - Business School Dean

10 Buckman Laboratories Buckman Laboratories Founder’s Attitude toward ethics Founder’s Attitude toward ethics Credits Code of Ethics with KM Implementation SuccessCredits Code of Ethics with KM Implementation Success

11 Rationale HIPAA as a model HIPAA as a model Of the future of IT Of the future of IT Of an application with direct human affect Of an application with direct human affect Of the need for interaction between Ethics, Privacy and Security Of the need for interaction between Ethics, Privacy and Security

12 As long as I’m not breaking the law, I don’t care who sees my information – I have nothing to be afraid of. -MBA Student(s) Area for further research

13 Privacy As a personal issue As a personal issue As a legal issue As a legal issue Include constitutional discussionInclude constitutional discussion As an IT issue As an IT issue As an ethical issue As an ethical issue

14 Other Ethical Issues Identity Theft Identity Theft Disinformation and Misinformation Disinformation and Misinformation VR VR AI AI Equity of Access Equity of Access Games, Violence, Sex and Behavior Modeling Games, Violence, Sex and Behavior Modeling Government and Legal Government and Legal Medical and Scientific Impact Medical and Scientific Impact Send e-mail for list of resourcesSend e-mail for list of resources

15 Security Threats Threats HackersHackers VirusesViruses TrojansTrojans DOS attacksDOS attacks attack techniquesattack techniques Defenses Defenses EncryptionEncryption Virus detectionVirus detection BiometricsBiometrics Intrusion DetectionIntrusion Detection FirewallsFirewalls

16 Pedagogy Instructor Presentations Instructor Presentations Contemporary Readings Contemporary Readings Individual Research and Presentations Individual Research and Presentations Professional Guest Speakers Professional Guest Speakers Resources Resources

17 Conclusion A changing topic A changing topic Courses vary widely Courses vary widely A review and a new idea A review and a new idea Unlikely to develop a comprehensive set of topics Unlikely to develop a comprehensive set of topics Area could use further definition and organization Area could use further definition and organization Further research into pedagogical approaches is needed. Further research into pedagogical approaches is needed.

18 Invitation Who is offering (a) course(s) in IT Ethics Who is offering (a) course(s) in IT Ethics Who is offering (a) course(s) in EPS Who is offering (a) course(s) in EPS Who is interested in offering (a) course(s) in IT Ethics or EPS Who is interested in offering (a) course(s) in IT Ethics or EPS Topics, pedagogy, results Topics, pedagogy, results krogerd@xu.edu krogerd@xu.edu krogerd@xu.edu sena@xu.edu sena@xu.edu

19 Questions?


Download ppt "An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems."

Similar presentations


Ads by Google