ITD-3163 Cyber Ethics and Law

(OKS-ITD3163.AGB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

The Internet and Ethical Values

  • Cyberethics and the Law of the Horse
  • Iron Cage or Gateway to Utopia?
  • Ethical Values and the Digital Frontier
  • Postscript on Moral Theory
  • Floridi's Macroethics
  • Normative Principles
  • Discussion Questions
  • Additional Resources
2

Regulating and Governing the Internet

  • A Short History of the Internet
  • The Internet's Current Architecture
  • The World Wide Web
  • Electronic Commerce
  • Gatekeepers and Search Engines
  • Social Networking
  • Social Problems and Social Costs
  • A Bottom-Up Approach: The Power of Code
  • Internet Governance
  • Contested Sovereignty in Cyberspace
  • Discussion Questions
  • Case Studies
  • Additional Resources
3

Free Speech and Content Controls in Cyberspace

  • Speech and Internet Architecture
  • Pornography in Cyberspace
  • Hate Speech and Online Threats
  • Anonymous Speech
  • The Ethics of Blogging
  • Spam as Commercial Free Speech
  • Government Censorship and the Fate of Political Speech
  • Postscript
  • Discussion Questions
  • Case Studies
  • Additional Resources
4

Intellectual Property in Cyberspace

  • Background on Intellectual Property
  • Issues for the Internet and Networking Technologies
  • Postscript
  • Discussion Questions
  • Case Studies
  • Additional Resources
5

Regulating Internet Privacy

  • A Definition and Theory of Privacy
  • Personal Information on the Internet
  • Consumer Privacy on the Internet
  • The United States and the European Union: Divergent Paths to Privacy Protection
  • A Prescription for Privacy?
  • Privacy in the Workplace
  • Discussion Questions
  • Case Studies
  • Additional Resources
6

Securing the Electronic Frontier

  • Vulnerabilities of the Net
  • Cybercrime
  • Antipiracy Architectures
  • Trespass, Unauthorized Access, and Hacktivision
  • Security Measures in Cyberspace
  • The Encryption Controversy: A Public Policy Perspective
  • Encryption Code, Privacy, and Free Speech
  • Discussion Questions
  • Case Studies
  • Additional Resources
7

Catalysts for Change

  • Introduction
  • Milestones in Computing
  • Milestones in Networking
  • Milestones in Information Storage and Retrieval
  • Contemporary Information Technology Issues
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
8

Introduction to Ethics

  • Introduction
  • Subjective Relativism
  • Cultural Relativism
  • Divine Command Theory
  • Ethical Egoism
  • Kantianism
  • Act Utilitarianism
  • Rule Utilitarianism
  • Social Contract Theory
  • Virtue Ethics
  • Comparing Workable Ethical Theories
  • Morality of Breaking the Law
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
9

Networked Communications

  • Introduction
  • Spam
  • Internet Interactions
  • Text Messaging
  • Political Impact of Social Media and Online Advertising
  • Censorship
  • Freedom of Expression
  • Children and Inappropriate Content
  • Breaking Trust
  • Internet Addiction
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
10

Intellectual Property

  • Introduction
  • Intellectual Property Rights
  • Protecting Intellectual Property
  • Fair Use
  • Digital Media
  • Peer-to-Peer Networks and Cyberlockers
  • Protections for Software
  • Legitimacy of Intellectual Property Protection for Software
  • Open-Source Software
  • Creative Commons
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
11

Information Privacy

  • Introduction
  • Perspectives on Privacy
  • Information Disclosures
  • Data Mining
  • Examples of Consumer or Political Backlash
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
12

Privacy and the Government

  • Introduction
  • US Legislation Restricting Information Collection
  • Information Collection by the Government
  • Covert Government Surveillance
  • US Legislation Authorizing Wiretapping
  • USA PATRIOT Act
  • Regulation of Public and Private Databases
  • Data Mining by the Government
  • National Identification Card
  • Information Dissemination
  • Invasion
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
13

Computer and Network Security

  • Introduction
  • Hacking
  • Malware
  • Cyber Crime and Cyber Attacks
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
14

Computer Reliability

  • Introduction
  • Data-Entry or Data-Retrieval Errors
  • Software and Billing Errors
  • Notable Software System Failures
  • Therac-25
  • Tesla Version 7.0 (Autopilot)
  • Uber Test-Vehicle Accident
  • Computer Simulations
  • Software Engineering
  • Software Warranties and Vendor Liability
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
15

Professional Ethics

  • Introduction
  • How Well Developed Are the Computing Professions?
  • Software Engineering Code of Ethics
  • Analysis of the Code
  • Case Studies
  • Whistle-Blowing
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
16

Work and Wealth

  • Introduction
  • Automation and Employment
  • Workplace Changes
  • Globalization
  • The Digital Divide
  • The “Winner-Take-All” Society
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
A

Appendix A: Plagiarism

  • Consequences of Plagiarism
  • Guidelines for Citing Sources
  • Additional Information
B

Appendix B: Introduction to Argumentation

  • B.1 Introduction

1

Catalysts for Change

  • Understanding Mechanical Calculator
  • Understanding Information Storage and Retrieval Technologies
  • Understanding Catalysts for Change
2

Introduction to Ethics

  • Understanding Ethical Relativism Theories
  • Understanding Utility Theories
  • Understanding Ethics
3

Networked Communications

  • Understanding Networked Communications
4

Intellectual Property

  • Identifying Intellectual Property Examples
  • Protecting Intellectual Property
  • Understanding Open-Source Software
  • Understanding Intellectual Property
5

Information Privacy

  • Understanding Privacy
  • Learning Information Privacy
6

Privacy and the Government

  • Understanding the Patriot Act
  • Understanding the Privacy Act
  • Understanding Privacy and the Government
7

Computer and Network Security

  • Understanding Computer and Network Security
8

Computer Reliability

  • Understanding Computer Reliability
9

Professional Ethics

  • Understanding Responsibilities
10

Work and Wealth

  • Understanding Work and Wealth

Related Courses

All Courses
scroll to top