CISB 412 Social and Professional Issues Final Discussion.

Slides:



Advertisements
Similar presentations
BUSINESS B2 Ethics.
Advertisements

MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
4.1 © 2007 by Prentice Hall 4 Chapter Ethical and Social Issues in Information Systems.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall 0.
Social and Economic Impacts of IT Professor Matt Thatcher.
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
E-Commerce: Regulatory, Ethical, and Social Environments
Computer Ethics in Information Technology
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
CISB 412 Social and Professional Issues Understanding Privacy.
Module Final Review - MIS  Highlight main topics and concepts  Need to review sample exam papers  Make sure how the reading materials are related to.
C4- Social, Legal, and Ethical Issues in the Digital Firm
CS 415 Social Implications of Computing Coordinator: Leo Finkelstein, Jr. Course Review.
CISB 412 Social and Professional Issues Understanding Intellectual Property.
CISB 412 Social and Professional Issues Introduction.
CISB594 – Business Intelligence
Professional, Legal and Ethical Issues CPSC 356 Database Ellen Walker Hiram College (Includes figures from Database Systems by Connolly & Begg, © Addison.
Business Ethics and the Legal Environment of Business
Computer Ethics A Necessity for the new era. Why is Computer Ethics Important? The creation and existence of new questions that older laws cannot answer.
SKU3033 / SKF3033 NETWORK & SYSTEM ADMINISTRATOR.
CS 3043 Social Implications Of Computing 10/19/2015© 2004 Keith A. Pray 1 Class 9 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
CISB 412 Social and Professional Issues Introduction.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Ethical and Legal Practices in INFORMATION TECHNOLOGY.
Final Exam Review. History of Computing Know trends No dates.
Revision. The Paper Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks.
CISB 412 Social and Professional Issues Understanding Intellectual Property.
Intro to Ethics CSCI 327 Social Implications of Computing.
CHAPTER 3 Ethics and Privacy. CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Privacy.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
CISB 412 Social and Professional Issues Understanding Intellectual Property.
TEAMS-ETHICS-ACCESS CONSIDERING COMMUNICATION MODELS.
ICT CAPABILITY APPLYING SOCIAL AND ETHICAL PROTOCOLS AND PRACTICES WHEN USING ICT Typically by the end of Prep, students Typically by the end of Year 2,
October 2010, Week 1INFO2009 Professional and Legal Issues Professional and Legal Issues Module Overview INFO2009 (Professional and Legal Issues)
June 16INFO2009 Professional and Legal Issues Professional and Legal Issues Week INFO2009 (Professional and Legal Issues) Su White (saw)
For more course tutorials visit
Ethics and Values for Professionals
CS 2315 review.
Computers: Tools for an Information Age
Ethical and Social Issues in Information Systems
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
Business Ethics
PSY 302 STUDY Education Your Life - psy302study.com.
E-Commerce: Regulatory, Ethical, and Social Environments
Ethical and Social Issues in Information Systems
Y12 Transition Project AS Computer Science Free Powerpoint Templates.
Y12 Transition Project AS Computer Science Free Powerpoint Templates.
Presentation transcript:

CISB 412 Social and Professional Issues Final Discussion

Assessments 1.Final Exam 50% 2.Mid-Term Test/ Quizzes 20% 3.Assignment/Presentation 30% Assignment : To be submitted through a blog 1.Introduction to team members 2.Assignment Part 1 - Monday week 6, by 5 PM 3.Assignment Part 2 - Monday week 11, by 5 PM 4.Additional Task – answering questions week 14, by 5 PM

Assignment (recap) 4 parts (entries) – Intro to group members (5 marks) – Part 1 : Academic paper & presentation (20 marks) – Part 2 : The ACM sketch (20 marks) – Part 3 : ongoing tutorial tasks (15 marks) Total of 60 marks - contributing to 30% of overall marks

Final Task Answer the following questions as the final entry in your blog. To be completed by week 14 1.In the studies of Social Contract Theory ethical principle, the terms positive and negative rights are used. Compare and contrast these rights. 2.Explain Identity Theft and provide example to support your answer 3.Describe 5 types of software piracy 4.Explain the two types of digital divide

Watch out for … Identify and explain Explain with examples Compare and contrast Discuss and justify Marks – figure out the marks distribution before you start answering – E.g. identify the four types and explain each one’s benefits [10 marks]

Learning Outcomes At the end of this course, the student should be able to: Use and appreciates the ethical theories as tools to analyse moral problems Discuss issues related to the introduction of Information Technology into society Explain the ethical implication of Information Technology and Internet to intellectual property, privacy, lifestyle, work, wealth, and health. Be aware of the vulnerability of networked computers Be acquainted with selected professional codes of conducts

Learning Outcomes – Explain ethics, compare it with etiquette

Learning Outcomes – Describe and compare the frameworks/ethical principles that can be used for moral decisions

Learning Outcomes – Identify issues that come with networking especially the use of world wide web.

Learning Outcomes – Identify intellectual properties issues that come with the use of Information Technology

Learning Outcomes – Explain the perspectives of privacy

Learning Outcomes – Describe ways privacy can be compromised through the usage of technology

Learning Outcomes – Identify and describe the need for professional code of ethics

Learning Outcomes – Describe whistleblowing from the stance of organization and moral

Learning Outcomes – Discuss how Information Technology and automation affect workplace

Learning Outcomes – Discuss the changes in workplace and the impact to the society

Learning Outcomes – Apply the ethical principles on the issues to establish morality of the action

Chapter 2 Key Terms Society Ethics Etiquette Subjective Relativism Cultural Relativism Divine Command Theory Kantianism Act Utilitarianism Rule Utilitarianism Social Contract Theory

Chapter 3 Key Terms – SPAM – Pornography – Web Filters – Identity theft – Online Predators – Internet Addiction

Chapter 4 & 5 Key Terms – Intellectual Property – Copyrights – Patents – Trademarks – Trade secrets – Software Piracy – Softlifting, Uploading & Downloading, Software Counterfeiting, OEM, Hard disk loading, Renting – Licensing – Freeware, Free Software, Shareware, Nagware, Crippleware etc

Chapter 6 Key Terms Privacy Public Record Public Information Personal Information Types of information disclosure – statutory, involuntary, voluntary Data mining Ownership of transaction info – opt-in, opt-out Dumpster diving, shoulder surfing (low tech info theft) Encryption

Chapter 7 Key Terms Professional society whistle blowing

Chapter 8 Key Terms Telework Workplace monitoring Video surveillance

Questions?