IT400 Ethics in Cybersecurity

(PG-IT400.AB1)
Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Catalysts for Change

  • Introduction
  • Milestones in Computing
  • Milestones in Networking
  • Milestones in Information Storage and Retrieval
  • Contemporary Information Technology Issues
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
2

Introduction to Ethics

  • Introduction
  • Subjective Relativism
  • Cultural Relativism
  • Divine Command Theory
  • Ethical Egoism
  • Kantianism
  • Act Utilitarianism
  • Rule Utilitarianism
  • Social Contract Theory
  • Virtue Ethics
  • Comparing Workable Ethical Theories
  • Morality of Breaking the Law
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
3

The Internet and Ethical Values

  • Cyberethics and Code
  • Iron Cage or Gateway to Utopia?
  • Ethical Values and the Digital Frontier
  • Postscript on Moral Theory
  • Floridi’s Macroethics
  • Normative Principles
  • Additional Resources
4

Professional Ethics

  • Introduction
  • How Well Developed Are the Computing Professions?
  • Software Engineering Code of Ethics
  • Analysis of the Code
  • Case Studies
  • Whistle-Blowing
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
5

Work and Wealth

  • Introduction
  • Automation and Employment
  • Workplace Changes
  • Globalization
  • The Digital Divide
  • The “Winner-Take-All” Society
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
6

Information and Power: Regulating and Governing Networked Technologies

  • The Early History of the Internet
  • The Internet’s Architecture
  • Net Neutrality
  • The World Wide Web
  • Gatekeepers and Search Engines
  • Social Networking
  • Internet Governance
  • Contested Sovereignty in Cyberspace
  • Internet Monopolies
  • Discussion Questions
  • Case Studies: American or Australian Libel Law?
  • Additional Resources
7

Intellectual Property

  • Introduction
  • Intellectual Property Rights
  • Protecting Intellectual Property
  • Fair Use
  • Digital Media
  • Peer-to-Peer Networks and Cyberlockers
  • Protections for Software
  • Legitimacy of Intellectual Property Protection for Software
  • Open-Source Software
  • Creative Commons
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
8

Free Speech and Censorship in Cyberspace

  • Speech and Internet Architecture
  • Pornography in Cyberspace
  • Hate Speech
  • Online Threats
  • Anonymous Speech
  • Government Censorship and the Fate of Political Speech
  • Postscript
  • Discussion Questions
  • Case Studies: When Is a Facebook Post a Real Threat?
  • Additional Resources
9

Information Privacy

  • Introduction
  • Perspectives on Privacy
  • Information Disclosures
  • Data Mining
  • Examples of Consumer or Political Backlash
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
10

Intellectual Property in Cyberspace

  • Background on Intellectual Property
  • Issues for the Internet and Networking Technologies
  • Digital Books and E-Books
  • Postscript
  • Discussion Questions
  • Case Studies: Readers' Rights, Remixing, and Mashups
  • Additional Resources
11

Privacy and the Government

  • Introduction
  • US Legislation Restricting Information Collection
  • Information Collection by the Government
  • Covert Government Surveillance
  • US Legislation Authorizing Wiretapping
  • USA PATRIOT Act
  • Regulation of Public and Private Databases
  • Data Mining by the Government
  • National Identification Card
  • Information Dissemination
  • Invasion
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
12

Computer and Network Security

  • Introduction
  • Hacking
  • Malware
  • Cyber Crime and Cyber Attacks
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
13

Privacy Rights in the Age of Surveillance

  • A Definition and Theory of Privacy
  • Personal Information on the Internet
  • Consumer Privacy on the Internet
  • The United States and the European Union: Divergent Paths to Privacy Protection
  • A Prescription for Privacy?
  • Privacy in the Workplace
  • Discussion Questions
  • Case Studies: Privacy and the Right to Be Forgotten
  • Additional Resources
14

Computer Reliability

  • Introduction
  • Data-Entry or Data-Retrieval Errors
  • Software and Billing Errors
  • Notable Software System Failures
  • Therac-25
  • Tesla Version 7.0 (Autopilot)
  • Uber Test-Vehicle Accident
  • Computer Simulations
  • Software Engineering
  • Software Warranties and Vendor Liability
  • Summary
  • Further Reading and Viewing
  • Discussion Questions
  • In-Class Exercises
  • References
15

Securing the Digital Infrastructure

  • Vulnerabilities of Networked Technologies
  • Cybercrime
  • Antipiracy Architectures
  • Trespass, Hackers, and Hacktivism
  • Security Measures in Cyberspace
  • CyberSecurity as a Moral Obligation
  • The Encryption Controversy: A Public Policy Perspective
  • New Encryption Disputes and Challenges
  • Encryption Code, Privacy, and Free Speech
  • Discussion Questions
  • Case Studies: The Lulz Sec Hackers
  • Additional Resources
A

Appendix A: Plagiarism

  • Consequences of Plagiarism
  • Guidelines for Citing Sources
  • Additional Information
B

Appendix B: Introduction to Argumentation

  • B.1 Introduction

1

Catalysts for Change

  • Understanding Mechanical Calculator
  • Understanding Information Storage and Retrieval Technologies
  • Understanding Catalysts for Change
2

Introduction to Ethics

  • Understanding Ethical Relativism Theories
  • Understanding Utility Theories
  • Understanding Ethics
3

The Internet and Ethical Values

  • Understanding Lessig's Constraints
  • Understanding Iron Cage or Gateway to Utopia
  • Discussing About the Internet and Ethical Values
  • Understanding Moral Theories
  • Understanding Negative and Positive Rights
  • Understanding Contractarianism and Utilitarianism
  • Understanding Moral Theories
  • Understanding the Floridi’s Ethical Theory
  • Understanding Normative Principles
4

Professional Ethics

  • Understanding Responsibilities
5

Work and Wealth

  • Understanding Work and Wealth
6

Information and Power: Regulating and Governing Networked Technologies

  • Understanding ARPANET
  • Understanding Internet-Related Terms
  • Introducing the Internet Architecture
  • Understanding ICANN
7

Intellectual Property

  • Identifying Intellectual Property Examples
  • Protecting Intellectual Property
  • Understanding Open-Source Software
  • Understanding Intellectual Property
8

Free Speech and Censorship in Cyberspace

  • Understanding Child Pornography Acts
  • Understanding the Communications Decency Act
  • Understanding COPA
  • Understanding CIPA
  • Discussing About Hate Speech, Anonymous Speech, and Internet Threats
9

Information Privacy

  • Understanding Privacy
  • Learning Information Privacy
10

Intellectual Property in Cyberspace

  • Understanding the Copyright Term Extension Act
  • Understanding Types of Legal Protections
  • Understanding Legal Protection for Intellectual Property
  • Understanding the Digital Millennium Copyright Act
  • Understanding Copyright Laws
  • Understanding Legal Protection Terms
  • Understanding DRM
11

Privacy and the Government

  • Understanding the Patriot Act
  • Understanding the Privacy Act
  • Understanding Privacy and the Government
12

Computer and Network Security

  • Understanding Computer and Network Security
13

Privacy Rights in the Age of Surveillance

  • Identifying Types of Risks
  • Understanding Seclusion Theory Terms
  • Discussing the FCRA and COPPA Acts
  • Understanding the Fair Credit Reporting Act
  • Explaining Types of Acts
14

Computer Reliability

  • Understanding Computer Reliability
15

Securing the Digital Infrastructure

  • Understanding Internet worms
  • Understanding CFAA
  • Discussing About Cybercrime and its Security Measures
  • Learning About Public Key Encryption
  • Understanding DES and AES
  • Understanding the Clipper Chip

Any questions?
Check out the FAQs

Still have unanswered questions and need to get in touch?

Contact Us Now

Related Courses

All Courses
scroll to top