ITM3210 - IT Law & Ethics

(ANC-ITM3210.AB1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Catalysts for Change and Introduction to Ethics

  • Catalysts for Change - Introduction
  • Milestones in Computing
  • Milestones in Networking
  • Milestones in Information Storage and Retrieval
  • Contemporary Information Technology Issues
  • Ethics - Introduction
  • Subjective Relativism
  • Cultural Relativism
  • Divine Command Theory
  • Ethical Egoism
  • Kantianism
  • Act Utilitarianism
  • Rule Utilitarianism
  • Social Contract Theory
  • Virtue Ethics
  • Comparing Workable Ethical Theories
  • Morality of Breaking the Law
  • Discussion Questions
  • In-Class Exercises
2

Information Privacy and the Government

  • Information Privacy - Introduction
  • Perspectives on Privacy
  • Information Disclosures
  • Data Mining
  • Examples of Consumer or Political Backlash
  • Privacy and the Government - Introduction
  • US Legislation Restricting Information Collection
  • Information Collection by the Government
  • Covert Government Surveillance
  • US Legislation Authorizing Wiretapping
  • USA PATRIOT Act
  • Regulation of Public and Private Databases
  • Data Mining by the Government
  • National Identification Card
  • Information Dissemination
  • Invasion
  • Discussion Questions
  • In-Class Exercises
3

Intellectual Property, Professional Ethics, Work and Wealth

  • Intellectual Property - Introduction
  • Intellectual Property Rights
  • Protecting Intellectual Property
  • Fair Use
  • Digital Media
  • Peer-to-Peer Networks and Cyberlockers
  • Protections for Software
  • Legitimacy of Intellectual Property Protection for Software
  • Open-Source Software
  • Creative Commons
  • Professional Ethics - Introduction
  • How Well Developed Are the Computing Professions?
  • Software Engineering Code of Ethics
  • Analysis of the Code
  • Case Studies
  • Whistle-Blowing
  • Work and Wealth - Introduction
  • Automation and Employment
  • Workplace Changes
  • Globalization
  • The Digital Divide
  • The “Winner-Take-All” Society
  • Discussion Questions
  • In-Class Exercises
4

Networked Communications, Computer, Network Security and Reliability

  • Networked Communications - Introduction
  • Spam
  • Internet Interactions
  • Text Messaging
  • Political Impact of Social Media and Online Advertising
  • Censorship
  • Freedom of Expression
  • Children and Inappropriate Content
  • Breaking Trust
  • Internet Addiction
  • Computer and Network Security - Introduction
  • Hacking
  • Malware
  • Cyber Crime and Cyber Attacks
  • Computer Reliability - Introduction
  • Data-Entry or Data-Retrieval Errors
  • Software and Billing Errors
  • Notable Software System Failures
  • Therac-25
  • Tesla Version 7.0 (Autopilot)
  • Uber Test-Vehicle Accident
  • Computer Simulations
  • Software Engineering
  • Software Warranties and Vendor Liability
  • Discussion Questions
  • In-Class Exercises
A

Appendix

  • Appendix A: Plagiarism
  • Consequences of Plagiarism
  • Guidelines for Citing Sources
  • Additional Information
  • Appendix B: Introduction to Argumentation
  • B.1 Introduction

1

Catalysts for Change and Introduction to Ethics

  • Understanding Ethical Relativism Theories
  • Understanding Utility Theories
2

Information Privacy and the Government

  • Understanding Privacy
  • Understanding Privacy and the Government
3

Intellectual Property, Professional Ethics, Work and Wealth

  • Understanding Open-Source Software
  • Understanding Intellectual Property
4

Networked Communications, Computer, Network Security and Reliability

  • Understanding Networked Communications
  • Understanding Computer and Network Security
  • Understanding Computer Reliability

Related Courses

All Courses
scroll to top