J. Chansavang. Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics.

Slides:



Advertisements
Similar presentations
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 1: Unwrapping the Gift.
Advertisements

Ethical Issues of Computer Networks
Chapter 1 – A,B Computers and Digital Basics. Chapter 1: Computers and Digital Basics 2 All Things Digital  The Digital Revolution  Convergence  Digital.
PowerPoint Presentation Possible Topics Related to General Education Area VI Computer Science Appendix B.
4-1. Business in a Changing World McGraw-Hill/Irwin Copyright © 2009 by the McGraw-Hill Companies, Inc. All rights reserved. Chapter 4 Managing Information.
Cyber Ethics Moral Values in Cyber Space The Good, the Bad, and the Electronic.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
E-Commerce: Regulatory, Ethical, and Social Environments
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
8 | 2Copyright © Houghton Mifflin Company. All rights reserved. Part Four Using Technology And Information To Build Customer Relationships.
© 2015 Cengage Learning1. Chapter 9 Business Ethics and Technology © 2015 Cengage Learning2.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Business & Society Business & Society Ethics, Sustainability, and Stakeholder Management Eighth Edition Archie B. Carroll Ann K. Buchholtz © 2012 South-Western,
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Chapter 17 Objectives: 6.04, 6.05, 10.05, Using the Internet Web sites: pages on the World Wide Web that contain text, images, audio, and video.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
CSE/ISE 312 Privacy (Part 2). The Business and Social Sectors Marketing and personalization What we do ourselves Location tracking A right to be forgotten.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chapter 1 Unwrapping the Gift.
Unit 1 – Digital Literacy – Computer Terms Mr. M. Goldberg, Martingrove C.I., 2011 Digital Literacy Review By Mr. M. Goldberg – Martingrove C.I. October,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Concept #14.  In order to be successful on the job, what technology skills do you think you should develop?
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Digital Citizenship Multimedia II Ann Darling. Digital Citizenship What is Digital citizenship? – “Digital citizenship can be defined as the norms of.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Jeopardy: Digital Citizenship Please use presentation mode!
A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
SURVEILLANCE The Fears of the Digital Age. Privacy –Identity –Anonymity Logging –Tracking Hacking Censorship State Security/Anti Terror Online The Discussion.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 1: Unwrapping the Gift.
What is computer ethics?  Computer Ethics is a branch of practical philosophy which deals with how computing professionals should make decisions regarding.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch. 6-1 The Legal Environment of Business A Critical Thinking.
Beyond Our Borders: A Global Perspective on Technology Beverly Amer Orlando, Florida March 17, 2011.
1 Chapter 1: Introduction ISYM 540 Current Topics in Information Systems Management.
Digital citizenship By: Cody Quinn.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 3: Freedom of Speech.
Information Warfare Playgrounds to Battlegrounds.
APPLICATION TO SPECIFIC SCENARIOS An Overview of Strand 2.
Internet Research Law and Ethics. Consider the Law Legal and ethical issues help us broaden considerably our study of Internet research. Even relatively.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
THE LEGAL ENVIRONMENT OF BUSINESS © 2006 Prentice Hall Ch. 6-1 A Critical Thinking Approach Fourth Edition Nancy K. Kubasek Bartley A. Brennan M. Neil.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
CISB 412 Social and Professional Issues Final Discussion.
D IGITAL C ITIZENSHIP By Raquel Laliberty. Digital access is the equal ability for people in different countries and societies to access digital technology.
Intro to Business, 7e © 2009 South-Western, Cengage Learning SLIDE Chapter 11 1 CHAPTER Computer Systems Business Applications of.
Social and environmental impact
Project Selection Workshop
Appendix B Possible Research Topics for CS Taken from A Gift of Fire by Sara Basse PowerPoint Presentation Possible Topics Related to General Education.
Internet Research Law and Ethics.
E-Commerce: Regulatory, Ethical, and Social Environments
Chapter 13 Security and Ethical Challenges.
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
Copyright 2005 Prentice- Hall, Inc.
A Gift of Fire Third edition Sara Baase
Presentation transcript:

J. Chansavang

Use this Powerpoint to gain understanding about the main areas that are affected by computers and technology. Possible research topics are categorized under each of these areas and are followed by the chapter number in A Gift of Fire under which they can be located. * Refer to the accompanying document for additional information on each topic.

Major Areas Affected by Technology Economy Workplace Society Environment Government/Politics Laws/Regulations

Graphical Representation

Economy Artificial Intelligence (1) Automated Systems (1) Robotics (1) Censorship on the Global Net (3) Online Gambling (7) The Global Economy (7) The Neo-Luddite View (7)

Workplace E-Commerce (1) Monitoring Employee s/Web Use (2) Net Neutrality (6) Telecommuting (6) Software and Design Testing (8) Computer Ethics (9) Ethical Views on Technology (9)

Society Blogs (1) Cell Phones (1) Wireless phones and GPS (1) Social Networking (1) Tools for the Disabled (1) Distance Education (1) Identification and Biometrics (1) Privacy on the Web (2) Video Surveillance (2) DNA Databases (2) Parental Controls (2) Video Games and Violence (3)

Society, Cont. Anonymity (3) Gender/Ethics Issues (3) Health Information on the Web (3) Free Software (4) Computers and Community (7) The End of the Human Race? (7) 50 Years From Now (7) Computers in Schools (8) Computers in Restaurants (8) Are Libraries and Books Obsolete? (8) Targeted Advertising (9)

Environment Future of Electronic Commerce (6) Computers and the Environment (6) Cyberspace Communities (7) Our Dependency on Computers (8)

Government/Politics Access to Public Records (2) Government Surveillance on Communication (2) Political Activism on the Net (3) Technological Responses to Terrorism (5) Electronic and Internet Voting (6) Information Warfare (9) Government Surveillance of the Internet (9)

Laws/Regulations Privacy Regulations in Other Countries (2) Hate Speech on the Internet (3) Spam (3) File Copying/Sharing (4) Music/Movies Copyright Battles (4) Computers in Law Enforcement (5) Hacking (5) Identity Theft (5) Scams and Forgery(5)

Pick A Good One! Pick A Good One!