University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics.

Slides:



Advertisements
Similar presentations
1 Statistical concepts Module 1, Session 1. 2 Objectives From this session participants will be able to: Outline the content of the set of modules in.
Advertisements

The Do-It-Yourself Research Data Management Training Kit for Librarians Robin Rice, Data Librarian, EDINA and Data Library, University.
Presentation slide 1.1 The government’s vision “My vision is one where schools are confidently, successfully and routinely exploiting ICT … By doing so.
The Security Analysis Process University of Sunderland CIT304 Harry R. Erwin, PhD.
Hands-On Ethical Hacking and Network Defense
Chapter 1 – Introduction
EDUC 260: Week 13 Hand-in your Position Paper. Overview Administrivia Ethics of computing in classrooms What did we learn in the course? Course evaluations.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Department of Computer Science City College of New York City College of New York Spring 2006 Copyright © 2006 by Abbe Mowshowitz CSc 375 SOCIAL ISSUES.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Frequently asked questions about software engineering
Lecture 1.
Science in Action. SOCIETY Scientific results influence society SOCIETY Scientific results influence society TRUST RESEARCH COMMUNITY New research is.
The Computer Science Course at Omar Al-Mukhtar University, Libya The Computer Science Course at Omar Al-Mukhtar University, Libya User-Centered Design.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
WESTERN SUFFOLK BOCES L.A. WILSON TECH EARLY CHILDHOOD EDUCATION and CARE I & II.
Chapter 1- Introduction Lecture 1 Ready, fire, aim (the fast approach to software development). Ready, aim, aim, aim, aim... (the slow approach to software.
Management Information Systems
The Security Analysis Process University of Sunderland CSEM02 Harry R. Erwin, PhD.
Kelly Ralph EDUC 318. Points of interest:  Ethical Issues  Social Networking  Acceptable use of policies  Netiquette  Cyberbullying  Student data.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Software engineering. What is software engineering? Software engineering is an engineering discipline which is concerned with all aspects of software.
Computer Science Studies and Distance Education Unique Aspects Wingate Seminar London May 2005.
GOLDEN ERA TECHNOLOGIES DIRECTOR: B.GANESH
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Course Overview Engineering & Management (EAM) Integrated Product Design (IPD) Ian Black Course Coordinator – Design and Management.
Computer Science Department of 16 October 2012 Creating a Progression of Writing, Speaking & Teaming Learning Outcomes.
Overview of this morning What … is computing? Why … is computing an important skill to learn? What … will my child be learning in computing lessons?
Professionalism in Computing An Overview Khurshid Ahmad, Prof. PhD, CEng., MBCS Department of Computing, University of Surrey, Guildford, Surrey.
CMSC 345, Fall CMSC 345 Software Design and Development Fall 2003 Section 0101 Ms. Susan Mitchell Leave Your Ego at the Door!
ECE 396 – Senior Design I Fall 2015 Semester Lecture 1 Introduction to Senior Design.
Introduction to the ICT Module Tutor: Pam Maunders.
 Introduction to Computing  Computer Programming  Terrorisom.
The Manchester Curriculum “Principles in Evolution, Spirals and Generation X” Tony Freemont Head of Undergraduate Medical Education.
C o n f i d e n t i a l 1 Course: BCA Semester: III Subject Code : BC 0042 Subject Name: Operating Systems Unit number : 1 Unit Title: Overview of Operating.
Introduction to the ICT Module Tutor: Pam Maunders.
CSE 102 Introduction to Computer Engineering What is Computer Engineering?
Security Awareness – Essential Part of Security Management Ilze Murane.
University of Sunderland Professionalism and Personal Skills Unit 8 Professionalism and Personal Skills Lecture 8: Professionalism and Ethics.
Introduction to the ICT Module Tutor: Pam Maunders.
Fall 2015CISC/CMPE320 - Prof. McLeod1 CISC/CMPE320 Lecture Videos will no longer be posted. Assignment 3 is due Sunday, the 8 th, 7pm. Today: –System Design,
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
University of Sunderland MSc HIM Computer Legislation.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 1 Slide 1 An Introduction to Software Engineering.
Building Resources for Teaching Computer Architecture Through Peer Review Edward F. Gehringer Dept. of Electrical & Computer Engineering Dept. of Computer.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Integrating Social Media into IS/IT Courses: A Success Story to Report.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Integrating eHealth into the Undergraduate Nursing Curriculum
Chapter 1- Introduction
CS281 – Introduction to Software Engineering Chapter1: Introduction
CSC350: Learning Management Systems
Chapter 1- Introduction
Five to Thrive Falkirk Community Planning Partnership – SOLD Plan
Frequently asked questions about software engineering
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Information Systems Security Winter
What are the attributes of good software?
CS281 – Introduction to Software Engineering Chapter1: Introduction
Penetration Testing Computer Science and Software Engineering
Chapter 28: User Security
* WP07 Strengthening of Young Scientists Qualification
Skills for Learning, Life and Work
CyberSecure: Your Medical Practice
Lecture 1 Introduction to Software Construction
Presentation transcript:

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Lecture Ethics

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Objectives By the end of this lecture the student should – –Appreciate the Ethical Issues

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Overview What part do Ethics play?

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Aim of Computer Ethics Make Computer Professionals –More thoughtful –More careful Produce better computer scientists Provide usable concepts and material for use in an integrated approach for teaching and applying computer ethics

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Aim of Computer Ethics (cont) Aim to have Computer Ethics Applied across all computer science Make Computing and People who use Computers more Socially Responsible

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Other Ethical Issues Electronic Commerce Ethics Policies Software/Hardware Copying/Pirating Software

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Other Ethical Issues Most computer security systems are a result of competition between hackers and those attempting to maintain security New challenges appear on every technological horizon WWW programming language JAVA has created an arms race between security protection experts and hackers

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Other Ethical Issues Surreptitious malicious applets that delete files and send private information are causing major concern Known Java based attacks can be summarised into five categories

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Computer Professionals and Computer Ethics Education Gotterbarn (1995) –Positive guides to ethical behaviour need to be in place in current software engineering courses starting in the early stages and running through the entire program –Discussion of ethics interactively throughout the course is likely to be most effective

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Computer Professionals and Computer Ethics Education Martin & Martin (1990) –Ethical dimensions should be integrated into the early stages of education and linked to managing technology –Computer education now begins in elementary school, this is where computer ethics education should begin

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Computer Professionals and Computer Ethics Education Lu & Lin (1999) –Challenge to the Educators - integrating computer ethics topics into various modules could be the most effective way

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Computer Professionals and Computer Ethics Education Johnson (1998) –Proactive integrated approach to ethical issues in computing –Enhanced ethical behaviour by creating awareness of computer ethics and responsibility in young users of computers

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills What Using Computer Ethics and Aspiring to Professionalism Can do for YOU Help you get a better JOB Improve the standard of your WORK Help Society make best use of Technology Create Safe environments for people working with and using Computer Technology Create Computer Ethics policies Trust = Confidence

University of Sunderland Professionalism and Personal Skills Unit 6 Professionalism and Personal Skills Objectives –Appreciate the Ethical Issues