Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.

Size: px
Start display at page:

Download "Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p."

Transcription

1 Preface p. xix Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. 9 Boolean Algebra p. 10 Zuse's Z Series p. 11 Harvard Mark 1 p. 12 Colossus p. 13 The Atanasoff-Berry Computer p. 13 ENIAC (Electronic Numerical Integrator and Computer) p. 13 Small-Scale Experimental Machine p. 14 First Commerical Computers p. 15 Transistor p. 17 Integrated Circuit p. 18 IBM System/360 p. 19 Microprocessor p. 20 Milestones in Networking p. 22 Electricity and Electromagnetism p. 22 Telegraph p. 23 Telephone p. 24 Typewriter and Teletype p. 25 Radio p. 26 Television p. 27 Remote Computing p. 28 ARPANET p. 28 p. 29 Internet p. 29 NSFNET p. 31 Broadband p. 31 Milestones in Information Storage and Retrieval p. 31 Codex p. 31 Gutenberg's Printing Press p. 32 Newspapers p. 32 Hypertext p. 33 Personal Computers p. 34 Single-Computer Hypertext Systems p. 36 Networked Hypertext: World Wide Web p. 36 Search Engines p. 38 Information Technology Issues p. 39

2 Summary p. 40 Review Questions p. 42 Discussion Questions p. 46 In-Class Exercises p. 46 Further Reading p. 47 References p. 48 An Interview with Douglas Engelbart p. 51 Introduction to Ethics p. 53 Introduction p. 53 Defining Terms p. 54 Four Scenarios p. 55 Overview of Ethical Theories p. 59 Subjective Relativism p. 60 The Case for Subjective Relativism p. 60 The Case against Subjective Relativism p. 61 Cultural Relativism p. 62 The Case for Cultural Relativism p. 63 The Case against Cultural Relativism p. 64 Divine Command Theory p. 66 The Case for the Divine Command Theory p. 66 The Case against the Divine Command Theory p. 67 Kantianism p. 69 Good Will and the Categorical Imperative p. 69 Evaluating a Scenario Using Kantianism p. 71 The Case for Kantianism p. 72 The Case against Kantianism p. 73 Act Utilitarianism p. 74 Principle of Utility p. 74 Evaluating a Scenario Using Act Utilitarianism p. 75 The Case for Act Utilitarianism p. 76 The Case against Act Utilitarianism p. 77 Rule Utilitarianism p. 79 Basis of Rule Utilitarianism p. 79 Evaluating a Scenario Using Rule Utilitarianism p. 79 The Case for Rule Utilitarianism p. 80 The Case against Utilitarianism in General p. 81 Social Contract Theory p. 82 The Social Contract p. 82 Rawls's Theory of Justice p. 84 Evaluating a Scenario Using Social Contract Theory p. 87 The Case for Social Contract Theory p. 87

3 The Case against Social Contract Theory p. 89 Comparing Workable Ethical Theories p. 90 Morality of Breaking the Law p. 91 Social Contract Theory Perspective p. 91 Kantian Perspective p. 91 Rule Utilitarian Perspective p. 92 Act Utilitarian Perspective p. 93 Conclusion p. 93 Summary p. 94 Review Questions p. 95 Discussion Questions p. 97 In-Class Exercises p. 98 Further Reading p. 99 References p. 99 An Interview with James Moor p. 103 Networking p. 107 Introduction p and Spam p. 109 How Works p. 109 The Spam Epidemic p. 110 Ethical Evaluations of Spamming p. 112 Fighting Spam p. 115 Mail Abuse Prevention System p. 115 Ethical Evaluations of Blacklisting by MAPS p. 116 Proposed Solutions to the Spam Epidemic p. 117 CAN SPAM Act of 2003 p. 118 Emergence of "Spim" p. 120 The World Wide Web p. 120 Attributes of the Web p. 120 How We Use the Web p. 121 Too Much Control or Too Little? p. 123 Ethical Perspectives on Pornography p. 124 Analyses Concluding Pornography Is Immoral p. 124 Analyses Concluding Adult Pornography Is Moral p. 125 Commentary p. 125 Summary p. 125 Censorship p. 126 Direct Censorship p. 126 Self-Censorship p. 127 Challenges Posed by the Internet p. 127 Ethical Perspectives on Censorship p. 128

4 Freedom of Expression p. 129 History p. 129 Freedom of Expression Not an Absolute Right p. 130 FCC v. Pacifica Foundation et al. p. 131 Children and the Web p. 132 Web Filters p. 132 Child Internet Protection Act p. 133 Ethical Evaluations of CIPA p. 133 Breaking Trust on the Internet p. 135 Identity Theft p. 135 Chat-Room Predators p. 137 Ethical Evaluations of Police "Sting" Operations p. 138 False Information p. 139 Internet Addiction p. 140 Is Internet Addiction Real? p. 140 Contributing Factors p. 142 Ethical Evaluation of Internet Addiction p. 143 Summary p. 144 Review Questions p. 145 Discussion Questions p. 146 In-Class Exercises p. 147 Further Reading p. 148 References p. 148 An Interview with Jennifer Preece p. 153 Intellectual Property p. 155 Introduction p. 155 Intellectual Property Rights p. 157 What Is Intellectual Property? p. 157 Property Rights p. 157 Extending the Argument to Intellectual Property p. 159 Benefits of Intellectual Property Protection p. 161 Limits to Intellectual Property Protection p. 161 Protecting Intellectual Property p. 163 Trade Secrets p. 163 Trademarks and Service Marks p. 164 Patents p. 165 Copyrights p. 165 Fair Use p. 169 Sony v. Universal City Studios p. 170 RIAA v. Diamond Multimedia Systems Inc. p. 171 Digital Technology and Fair Use p. 173

5 New Restrictions on Use p. 174 Digital Millennium Copyright Act p. 174 Digital Rights Management p. 175 Secure Digital Music Initiative p. 175 Encrypting DVDs p. 176 Making CDs Copyproof p. 177 Criticisms of Digital Rights Management p. 177 Peer-to-Peer Networks p. 178 Napster p. 179 FastTrack p. 179 BitTorrent p. 180 RIAA Lawsuits p. 180 MP3 Spoofing p. 181 Universities Caught in the Middle p. 182 MGM v. Grokster p. 183 Legal Music Services on the Internet p. 184 Protections for Software p. 184 Software Copyrights p. 185 Violations of Software Copyrights p. 185 Software Patents p. 186 Safe Software Development p. 187 Open-Source Software p. 188 Consequences of Proprietary Software p. 188 Open-Source Definition p. 189 Beneficial Consequences of Open-Source Software p. 189 Examples of Open-Source Software p. 190 The GNU Project and Linux p. 191 Impact of Open-Source Software p. 192 Critique of the Open-Source Software Movement p. 192 Legitimacy of Intellectual Property Protection for Software p. 193 Rights-Based Analysis p. 193 Utilitarian Analysis p. 194 Conclusion p. 196 Creative Commons p. 196 Summary p. 198 Review Questions p. 202 Discussion Questions p. 203 In-Class Exercises p. 204 Further Reading p. 204 References p. 205 An Interview with Wendy Seltzer p. 209

6 Privacy p. 211 Introduction p. 211 Perspectives on Privacy p. 213 Defining Privacy p. 213 Harms and Benefits of Privacy p. 214 Is There a Natural Right to Privacy? p. 217 Privacy and Trust p. 220 Disclosing Information p. 221 Public Information p. 223 Rewards or Loyalty Programs p. 223 Body Scanners p. 224 Digital Video Recorders p. 224 Automobile "Black Boxes" p. 225 Enhanced 911 Service p. 225 RFIDs p. 226 Implanted Chips p. 227 Cookies p. 227 Spyware p. 228 U.S. Legislation p. 228 Fair Credit Reporting Act p. 228 The Family Education Rights and Privacy Act p. 229 Video Privacy Protection Act p. 229 Financial Services Modernization Act p. 229 Children's Online Privacy Protection Act p. 229 Health Insurance Portability and Accountability Act p. 230 Public Records p. 230 Census Records p. 230 Internal Revenue Service Records p. 231 FBI National Crime Information Center 2000 p. 231 Privacy Act of 1974 p. 232 Covert Government Surveillance p. 234 Wiretaps and Bugs p. 235 Operation Shamrock p. 237 U.S. Legislation Authorizing Wiretapping p. 238 Title III p. 239 Electronic Communications Privacy Act p. 239 Communications Assistance for Law Enforcement Act p. 239 USA PATRIOT Act p. 240 Data Mining p. 244 Marketplace: Households p. 246 IRS Audits p. 246

7 Syndromic Surveillance System p. 246 Total Information Awareness p. 247 Criticisms of the TIA Program p. 247 Who Should Own Information about a Transaction? p. 248 Opt-in Versus Opt-out p. 248 Platform for Privacy Preferences (P3P) p. 249 Identity Theft p. 249 Background p. 249 History and Role of the Social Security Number p. 251 Debate over a National ID Card p. 252 The REAL ID Act p. 253 Encryption p. 254 Symmetric Encryption p. 254 Public-Key Cryptography p. 255 Pretty Good Privacy p. 255 Clipper Chip p. 258 Effects of U.S. Export Restrictions p. 258 Digital Cash p. 259 Summary p. 262 Review Questions p. 264 Discussion Questions p. 266 In-class Exercises p. 268 Further Reading p. 269 References p. 269 An Interview with Ann Cavoukian p. 275 Computer and Network Security p. 279 Introduction p. 279 Viruses, Worms, and Trojan Horses p. 280 Viruses p. 280 Worms p. 283 The Internet Worm p. 286 Trojan Horses p. 290 Defensive Measures p. 291 Phreaks and Hackers p. 292 Hackers p. 292 Phone Phreaking p. 296 The Cuckoo's Egg p. 297 Legion of Doom p. 297 Fry Guy p. 298 U.S. v. Riggs p. 299 Steve Jackson Games p. 300

8 Retrospective p. 301 Penalties for Hacking p. 302 Recent Incidents p. 303 Denial-of-Service Attacks p. 304 Attacks that Consume Scarce Resources p. 304 Defensive Measures p. 307 Distributed Denial-of-Service Attacks p. 307 SATAN p. 308 Online Voting p. 308 Motivation for Online Voting p. 308 Proposals p. 309 Ethical Evaluation p. 310 Summary p. 313 Review Questions p. 314 Discussion Questions p. 315 In-Class Exercises p. 316 Further Reading p. 317 References p. 318 An Interview with Matt Bishop p. 321 Computer Reliability p. 325 Introduction p. 325 Data-Entry or Data-Retrieval Errors p. 326 Disfranchised Voters p. 326 False Arrests p. 327 Analysis: Accuracy of NCIC Records p. 327 Software and Billing Errors p. 328 Errors Leading to System Malfunctions p. 328 Errors Leading to System Failures p. 329 Analysis: E-Retailer Posts Wrong Price, Refuses to Deliver p. 329 Notable Software System Failures p. 330 Patriot Missile p. 331 Ariane 5 p. 332 AT&T; Long-Distance Network p. 333 Robot Missions to Mars p. 333 Denver International Airport p. 335 Therac-25 p. 336 Genesis of the Therac-25 p. 337 Chronology of Accidents and AECL Responses p. 337 Software Errors p. 340 Post Mortem p. 342 Moral Responsibility of the Therac-25 Team p. 343

9 Computer Simulations p. 344 Uses of Simulation p. 344 Validating Simulations p. 345 Software Engineering p. 347 Specification p. 347 Development p. 348 Validation p. 349 Software Quality Is Improving p. 350 Software Warranties p. 350 Shrinkwrap Warranties p. 351 Are Software Warranties Enforceable? p. 352 Uniform Computer Information Transaction Act p. 355 Moral Responsibility of Software Manufacturers p. 357 Summary p. 359 Review Questions p. 361 Discussion Questions p. 363 In-class Exercises p. 364 Further Reading p. 365 References p. 365 Work and Wealth p. 369 Introduction p. 369 Automation and Unemployment p. 370 Automation and Job Destruction p. 371 Automation and Job Creation p. 372 Effects of Increase in Productivity p. 375 Rise of the Robots? p. 376 Workplace Changes p. 379 Organizational Changes p. 379 Telework p. 381 Temporary Work p. 383 Monitoring p. 383 Multinational Teams p. 384 Globalization p. 385 Arguments for Globalization p. 385 Arguments against Globalization p. 387 Dot-Com Bust Increases IT Sector Unemployment p. 387 Foreign Workers in the American IT Industry p. 388 Foreign Competition p. 389 The Digital Divide p. 389 Evidence of the Digital Divide p. 390 Models of Technological Diffusion p. 391

10 Critiques of the Digital Divide p. 392 The "Winner-Take-All Society" p. 394 The Winner-Take-All Phenomenon p. 394 Harmful Effects of Winner-Take-All p. 395 Reducing Winner-Take-All Effects p. 397 Access to Public Colleges p. 397 Effects of Tuition Increases p. 397 Ethical Analysis p. 398 Summary p. 401 Review Questions p. 403 Discussion Questions p. 403 In-class Exercises p. 404 Further Reading p. 406 References p. 406 An Interview with Jerry Berman p. 411 Professional Ethics p. 415 Introduction p. 415 Is Software Engineering a Profession? p. 416 Characteristics of a Profession p. 416 Certified Public Accountants p. 417 Software Engineers p. 418 Software Engineering Code of Ethics p. 419 Preamble p. 420 Principles p. 421 Analysis of the Code p. 428 Preamble p. 428 Virtue Ethics p. 429 Alternative List of Fundamental Principles p. 432 Case Studies p. 433 Software Recommendation p. 434 Child Pornography p. 435 Anti-Worm p. 436 Whistleblowing p. 438 Morton Thiokol/NASA p. 439 Hughes Aircraft p. 441 Morality of Whistleblowing p. 443 Summary p. 446 Review Questions p. 448 Discussion Questions p. 449 In-class Exercises p. 450 Further Reading p. 451

11 References p. 451 An Interview with Paul Axtell p. 455 Plagiarism p. 459 Consequences of Plagiarism p. 459 Types of Plagiarism p. 459 Guidelines for Citing Sources p. 460 How to Avoid Plagiarism p. 460 Misuse of Sources p. 460 Additional Information p. 461 References p. 461 Table of Contents provided by Blackwell's Book Services and R.R. Bowker. Used with permission.

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Narayan Debnath, Eugene Lundak, Paul Schumacher Computer Science Department Winona State University Winona, MN 55987 e-mail:

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year 2017 18 Prepared

More information

CS 4001 Possible Term Paper Topics

CS 4001 Possible Term Paper Topics CS 4001 Possible Term Paper Topics Your topic does not have to come from this list. These are suggestions. The brief comments and questions for each topic are just a few ideas to spark your imagination

More information

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology.

CSI Professional Practice In Computer Science. Ethical, social, and professional aspects of the modern computing technology. CSI 2911 Professional Practice In Computer Science Ethical, social, and professional aspects of the modern computing technology Stan Matwin Jan. Apr. 2012 1 Introduction Why this class? Textbook, other

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples

More information

Preface. The rise of Web 2.0 applications allowing people to contribute content to the Web. The emergence of a real economy based on virtual worlds

Preface. The rise of Web 2.0 applications allowing people to contribute content to the Web. The emergence of a real economy based on virtual worlds Preface Computers and high-speed communication networks are transforming our world These technologies have brought us many benefits, but they have also raised many social and ethical concerns My view is

More information

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn).

b. Who invented it? Quinn credits Jeremy Bentham and John Stuart Mill with inventing the theory of utilitarianism. (see p. 75, Quinn). CS285L Practice Midterm Exam, F12 NAME: Holly Student Closed book. Show all work on these pages, using backs of pages if needed. Total points = 100, equally divided among numbered problems. 1. Consider

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

Chapter 4 INFORMATION SYSTEMS

Chapter 4 INFORMATION SYSTEMS Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2

Introduction. Privacy vs. need for credentials Privacy vs. desire for free expression Privacy vs. safety / security 1-2 Pi Privacy Introduction The World We Live In: Information collection, exchange, combination, and distribution easier than ever More information access less privacy Trade-offs Privacy vs. need for credentials

More information

Hi-Rez Studios Twitch Rewards Program Official Rules

Hi-Rez Studios Twitch Rewards Program Official Rules Hi-Rez Studios Twitch Rewards Program Official Rules Thank you for your interest in the Hi-Rez Studios Rewards Program for Twitch.tv (the "Program"). Hi-Rez Studios, Inc. ("Hi-Rez") wants a fair and fun

More information

CS 305: Social, Ethical and Legal Implications of Computing

CS 305: Social, Ethical and Legal Implications of Computing CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative

More information

Privacy and Security in an On Demand World

Privacy and Security in an On Demand World Privacy and Security in an On Demand World Harriet Pearson, V.P. Workforce & Chief Privacy Officer IBM Corporation Almaden Institute Symposium on Privacy April 9, 2003 2002 IBM Corporation Outline Where

More information

Getting on the same page

Getting on the same page Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Technology in Action. Topics. Computers in Your Career? What is Fluency With IT? 7/17/11. A Savvy Computer User and Consumer:

Technology in Action. Topics. Computers in Your Career? What is Fluency With IT? 7/17/11. A Savvy Computer User and Consumer: Technology in Action Chapter 1 Why Computers Matter to You: Becoming Computer Literate 1 Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 2 Topics Fluency with Information Technology

More information

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY

INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY UNIT 1 INTRODUCTION TO INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) EVOLUTION OF COMMUNICATION Communication has improved and evolved to facilitate

More information

Mountain Brook High School

Mountain Brook High School Mountain Brook High School Technology Operations and Concepts 1. Use accurate terminology related to technology. Use appropriate terminology related to technology. 2. Utilize advanced features of word

More information

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?

More information

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade Bibb County School District Technology Scope and Sequence indergarten - 12 th Grade Students will 1 2 3 5 Technology Operations and Concepts 1 Use accurate terminology related to technology. Use appropriate

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. Exam Name MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Food Inc. operates a website for their firm. They ask visitors to the website to give

More information

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Running head: THE IMPACT OF COMPUTER ENGINEERING 1 Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper

More information

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts

Tip. Getting on the same page. More topics - my favorites. Basic CSC 300 Issue List. Readings - make sure you keep up General Ethical concepts Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems MANAGEMENT INFORMATION SYSTEMS Chapter 4 Ethical and Social Issues in Information Systems Mohammad Najjar, PhD, MBA, BSc Operations & Supply Chain Management Learning Objectives 1. Identify ethical, social

More information

Identify and use a variety of media storage (cd, dvd, flash, cloud, and etc ) and rationalize their use for specific purposes

Identify and use a variety of media storage (cd, dvd, flash, cloud, and etc ) and rationalize their use for specific purposes Portage Township Schools K-12 Scope and Sequence 1 6-8.CD.2 6-8.CD.1 6-8.CD.1 6-8.CD.3 Demonstrate proficiency in the use of computers and applications as well as an understanding of the concepts underlying

More information

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc. Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 1 Using Technology to Change the World Topics Technology on the World Stage Technology and

More information

Whatever Happened to the. Fair Information Practices?

Whatever Happened to the. Fair Information Practices? Whatever Happened to the Fair Information Practices? Beth Givens Director Privacy Rights Clearinghouse Privacy Symposium August 22, 2007 Cambridge, MA Topics Definition and origins of FIPs Overview of

More information

Requiem for a Dream. On Advancing Human Rights via Internet Architecture. Farzaneh Badii and Milton Mueller

Requiem for a Dream. On Advancing Human Rights via Internet Architecture. Farzaneh Badii and Milton Mueller Requiem for a Dream On Advancing Human Rights via Internet Architecture Farzaneh Badii and Milton Mueller Summary Critical assessment of the belief that we can promote or protect HR through protocol standards

More information

Senior Design Projects: Sample Ethical Analyses

Senior Design Projects: Sample Ethical Analyses Senior Design Projects: Sample Ethical Analyses EE 441/442 Spring 2005 Introduction What follows are three sample ethical analyses to help you in the preparation of your senior design project report. Please

More information

All information is correct at the time of print and is subject to change without prior notice.

All information is correct at the time of print and is subject to change without prior notice. INFO KIT Copyright Message 2011. Copyright Prestariang Systems (No: 630804-K). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)

More information

MSc(CompSc) List of courses offered in

MSc(CompSc) List of courses offered in Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The

More information

Internet service providers. Manufacturers and retailers. Gaming providers. Individual artists (written, musical and visual arts) On-air talent

Internet service providers. Manufacturers and retailers. Gaming providers. Individual artists (written, musical and visual arts) On-air talent MEDIA ENTERTAINMENT Waller s media and entertainment practice goes beyond the typical Nashville representation of country music artists and labels to include companies and individuals in a wide range of

More information

GENERAL PRINCIPLES OF INTERNET GOVERNANCE

GENERAL PRINCIPLES OF INTERNET GOVERNANCE GENERAL PRINCIPLES OF INTERNET GOVERNANCE PROPOSAL OF THE FRENCH GOVERNMENT INTRODUCTION: THE VALUES OF THE INFORMATION SOCIETY The network has become a part of every nation s wealth and one of its most

More information

TECHNOLOGY GUIDELINES

TECHNOLOGY GUIDELINES DOCESE OF LANSNG Catholic Schools TECHNOLOGY GUDELNES Aligned with Michigan Content Standards and Benchmarks Diocesan Curriculum nstitute June, 2006 NDEX 2006 Diocesan Schools Technology Committee Technology

More information

Internet 2020: The Next Billion Users

Internet 2020: The Next Billion Users Internet 2020: The Next Billion Users Lawrence E. Strickling I. INTRODUCTION I am honored to have the opportunity to preface this edition of CommLaw Conspectus and discuss the Internet policy priorities

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Antitrust 1. Anti-Counterfeiting for Licensed Products: What You Don't Know Can Hurt Your Business 2. Antitrust Investigations:

More information

2) Software piracy is bad for business. 2) Answer: True False

2) Software piracy is bad for business. 2) Answer: True False Exam Name TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 1) Advances in data storage have made routine violation of individual privacy more difficult. 1) 2) Software

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Proposal # xxxxxxxxxxxx. Intercept Jammer. Date: Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

Computers And Society

Computers And Society Computers And Society Instructor: Dmitri A. Gusev Fall 2007 CS 113: Introduction to Computers Lecture 16, December 13, 2007 Ethical Issues in Computing 1. Disparity in access to computers and networks

More information

Preface Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved.

Preface Pearson Education, Inc. Upper Saddle River, NJ. All Rights Reserved. Computers and high-speed communication networks are transforming our world These technologies have brought us many benefits, but they have also raised many social and ethical concerns My view is that we

More information

USTR NEWS UNITED STATES TRADE REPRESENTATIVE. Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET

USTR NEWS UNITED STATES TRADE REPRESENTATIVE.   Washington, D.C UNITED STATES MEXICO TRADE FACT SHEET USTR NEWS UNITED STATES TRADE REPRESENTATIVE www.ustr.gov Washington, D.C. 20508 202-395-3230 FOR IMMEDIATE RELEASE August 27, 2018 Contact: USTR Public & Media Affairs media@ustr.eop.gov UNITED STATES

More information

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14 TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

The Case for ISO27001:2013

The Case for ISO27001:2013 The Case for ISO27001:2013 Second edition ALAN CALDER Every possible effort has been made to ensure that the information contained in this book is accurate at the time of going to press, and the publisher

More information

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents

More information

Ethics, privacy and legal issues concerning GIS. This is lecture 12

Ethics, privacy and legal issues concerning GIS. This is lecture 12 Ethics, privacy and legal issues concerning GIS This is lecture 12 New technologies; new laws Any new technology brings with it a set of previously unencountered ethical problems. E.g. printing press;

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

Ethics. Paul Jackson. School of Informatics University of Edinburgh

Ethics. Paul Jackson. School of Informatics University of Edinburgh Ethics Paul Jackson School of Informatics University of Edinburgh Required reading from Lecture 1 of this course was Compulsory: Read the ACM/IEEE Software Engineering Code of Ethics: https: //ethics.acm.org/code-of-ethics/software-engineering-code/

More information

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia.

Course Topics. COS 109: Computers in our World. Today: Administration. House rules. A bit of numeracy. Administrivia. COS 109: Computers in our World Andrea LaPaugh aslp@cs.princeton.edu www.cs.princeton.edu/~aslp 304 Computer Science Building, 258-4568 (email is always better) TAs: Jacopo Cesareo, 103B CS Building, jcesareo@...,

More information

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper

Aakriti Endlaw IT /23/16. Artificial Intelligence Research Paper 1 Aakriti Endlaw IT 104-003 2/23/16 Artificial Intelligence Research Paper "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code on http://oai.gmu.edu/the-mason-honor-code-2/

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION

COMMISSION OF THE EUROPEAN COMMUNITIES COMMISSION RECOMMENDATION COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 20.8.2009 C(2009) 6464 final COMMISSION RECOMMENDATION 20.8.2009 on media literacy in the digital environment for a more competitive audiovisual and content

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

1 HB By Representatives Boothe, Clouse, Rowe and Martin. 4 RFD: State Government. 5 First Read: 02-MAR-17. Page 0

1 HB By Representatives Boothe, Clouse, Rowe and Martin. 4 RFD: State Government. 5 First Read: 02-MAR-17. Page 0 1 HB354 2 183292-1 3 By Representatives Boothe, Clouse, Rowe and Martin 4 RFD: State Government 5 First Read: 02-MAR-17 Page 0 1 183292-1:n:03/01/2017:MA/mfc LRS2017-868 2 3 4 5 6 7 8 SYNOPSIS: Under existing

More information

Slide 25 Advantages and disadvantages of patenting

Slide 25 Advantages and disadvantages of patenting Slide 25 Advantages and disadvantages of patenting Patent owners can exclude others from using their inventions. If the invention relates to a product or process feature, this may mean competitors cannot

More information

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY

Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY Encouraging Economic Growth in the Digital Age A POLICY CHECKLIST FOR THE GLOBAL DIGITAL ECONOMY The Internet is changing the way that individuals launch businesses, established companies function, and

More information

2009 New Jersey Core Curriculum Content Standards - Technology

2009 New Jersey Core Curriculum Content Standards - Technology P 2009 New Jersey Core Curriculum Content s - 8.1 Educational : All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaboratively

More information

Wireless systems. how radio works radio spectrum allocation examples. tradeoffs. non-technical issues

Wireless systems. how radio works radio spectrum allocation examples. tradeoffs. non-technical issues Wireless systems how radio works radio spectrum allocation examples cell phones 802.11 (WiFi) Bluetooth GPS RFID: prox, E-ZPass, store tags, passports,...... tradeoffs spectrum, power, range, size, weight,

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Alabama Course of Study Digital Literacy and Computer Science Grade 8

Alabama Course of Study Digital Literacy and Computer Science Grade 8 A Correlation of Computer Programming Fundamental Concepts Using Java 2017 To the Alabama Course of Study Digital Literacy and Computer Science Grade 8 Recurring Standards for Digital Literacy and Computer

More information

Cyberspace: The new international legal frontier

Cyberspace: The new international legal frontier Cyberspace: The new international legal frontier Keynote address to the Council of Europe Convention on Cybercrime 23 November 2011 CHECK AGAINST DELIVERY Acknowledgements Thorbjorn Jagland - Secretary

More information

Cutest Kids Photo Contest

Cutest Kids Photo Contest Cutest Kids Photo Contest Cutest Kids Photo Contest is an online contest across HITS 99.9, 93.3 KIOA, STAR 102.5, MORE 104.1 and LAZER 103.3 that will occur from Monday, March 12 th until Sunday, March

More information

MULTIMEDIA PRODUCTION CHECKLIST

MULTIMEDIA PRODUCTION CHECKLIST MULTIMEDIA PRODUCTION CHECKLIST 1. Development Environment used? Purchase Source Code Use Tools with runtime licence Develop own source code 2. Operating environments targeted? PC under Windows Apple Macintosh

More information

Privacy by Design: Integrating Technology into Global Privacy Practices

Privacy by Design: Integrating Technology into Global Privacy Practices Privacy by Design: Integrating Technology into Global Privacy Practices Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Harvard Privacy Symposium August 23, 2007 Role of the IPC

More information

Check Your Understanding

Check Your Understanding Check Your Understanding 1. How can becoming proficient with technology help you understand and participate in important issues in the world at large? 2. How can knowledge of technology help you influence

More information

Individual Test Item Specifications

Individual Test Item Specifications Individual Test Item Specifications 8208110 Game and Simulation Foundations 2015 The contents of this document were developed under a grant from the United States Department of Education. However, the

More information

Agile Acquisition of Agile C2

Agile Acquisition of Agile C2 Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213 Dr. Paul Nielsen June 20, 2012 Introduction Commanders are increasingly more engaged in day-to-day activities There is a rapid

More information

The Ethics of Information Technology and Business

The Ethics of Information Technology and Business The Ethics of Information Technology and Business Foundations of Business Ethics Series editors: W. Michael Hoffman and Robert E. Frederick Written by an assembly of the most distinguished figures in business

More information

Danielle Vanderzanden

Danielle Vanderzanden Danielle Vanderzanden Shareholder Boston 617-994-5724 dani.vanderzanden@ogletreedeakins.com Ms. Vanderzanden is a Shareholder in the Boston Office and Co-Chair of the Firm s Data Privacy Practice Group.

More information

CSE468 Information Conflict

CSE468 Information Conflict CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview Reference Sources and Bibliography NOTE: There are a limited number of publications available

More information

Introduction State University of New York Press, Albany STEVE WESTBROOK

Introduction State University of New York Press, Albany STEVE WESTBROOK Introduction STEVE WESTBROOK Five years ago and fresh out of graduate school, I accepted my first tenure-track job at a small university. I had been trained in composition pedagogy. I had completed a dissertation

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID

MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID garfinkel.book Page 275 Thursday, June 2, 2005 11:56 PM Chapter 17 MULTIPLE SCENARIOS FOR PRIVATE-SECTOR USE OF RFID Ari Schwartz 1 Paula Bruening 2 Introduction T he private sector s rollout of RFID at

More information

neworleanscitypark.com/2018-photo-contest

neworleanscitypark.com/2018-photo-contest New Orleans City Park 2018 Photo Contest The Soul of City Park More than 160 years in the making, New Orleans City Park invites photographers to enter its 2018 Photo Contest! We are looking for striking

More information

Data mining and Domestic Security: Connecting the Dots to Make Sense of Data

Data mining and Domestic Security: Connecting the Dots to Make Sense of Data Center for Advanced Studies in Science and Technology Policy www.advancedstudies.org Information Environment National Security K. A. Taipale Final Pre-publication Draft December 2003 v.3.0b

More information

GAME PRODUCTION HANDBOOK Second Edition

GAME PRODUCTION HANDBOOK Second Edition THE GAME PRODUCTION HANDBOOK Second Edition BY HEATHER MAXWELL CHANDLER INFINITY SCIENCE PlliSS INFINITY SCIENCE PRESS LLC Hingham, Massachusetts New Delhi, India TABLE OF CONTENTS Foreword Preface Acknowledgments

More information

Industrial and Manufacturing Systems

Industrial and Manufacturing Systems Sets Focus Area: with Performance (KS/PI) Industrial and Manufacturing Systems ENPG02.01 Demonstrate effective oral, written, and visual communication related to industrial and manufacturing systems. ENPG02.01.01.00

More information

Unit 1: The Economic Fundamentals Weeks How does scarcity impact the decisions individuals and societies must make?

Unit 1: The Economic Fundamentals Weeks How does scarcity impact the decisions individuals and societies must make? Economics Teacher: Vida Unit 1: The Economic Fundamentals Weeks 1-4 Essential Questions 1. How does scarcity impact the decisions individuals and societies must make? 2. What roles do individuals and businesses

More information

Discussion Points Information Communication Technology: a Legal Practitioners. Perspective. Presented at Law Society of Zimbabwe Winter School 2016

Discussion Points Information Communication Technology: a Legal Practitioners. Perspective. Presented at Law Society of Zimbabwe Winter School 2016 Discussion Points Information Communication Technology: a Legal Practitioners Perspective Presented at Law Society of Zimbabwe Winter School 2016 Introduction Zimbabwe has the few laws and ICT related

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02

CODE OF CONDUCT. STATUS : December 1, 2015 DES C R I P T I O N. Internal Document Date : 01/12/2015. Revision : 02 STATUS : December 1, 2015 DES C R I P T I O N Type : Internal Document Date : 01/12/2015 Revision : 02 CODE OF CONDUCT. Page 2/7 MESSAGE FROM THE CHAIRMAN AND THE CEO Dear all, The world is continually

More information

DIMACS/PORTIA Workshop on Privacy Preserving

DIMACS/PORTIA Workshop on Privacy Preserving DIMACS/PORTIA Workshop on Privacy Preserving Data Mining Data Mining & Information Privacy: New Problems and the Search for Solutions March 15 th, 2004 Tal Zarsky The Information Society Project, Yale

More information

Hacking for Beginners: The Complete Guide

Hacking for Beginners: The Complete Guide Hacking for Beginners: The Complete Guide Tim Barnes Copyright 2017 by Tim Barnes - All rights reserved. The following ebook is reproduced below with the goal of providing information that is as accurate

More information

TECHNOLOGY CURRICULUM OBJECTIVES

TECHNOLOGY CURRICULUM OBJECTIVES TECHNOLOGY CURRICULUM OBJECTIVES DIOCESE OF ARLINGTON PHILOSOPHY Advancements in our rapidly changing world necessitate the acquisition of technological skills to enable students to function in the 21st

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following

First Components Ltd, Savigny Oddie Ltd, & Datum Engineering Ltd. is pleased to provide the following Privacy Notice Introduction This document refers to personal data, which is defined as information concerning any living person (a natural person who hereafter will be called the Data Subject) that is

More information

2014 New Jersey Core Curriculum Content Standards - Technology

2014 New Jersey Core Curriculum Content Standards - Technology 2014 New Jersey Core Curriculum Content Standards - Technology Content Area Standard Strand Grade Level bands Technology 8.2 Technology Education, Engineering, Design, and Computational Thinking - Programming:

More information

Section 1: Concept paper and questionnaire

Section 1: Concept paper and questionnaire Section 1: Concept paper and questionnaire Thomas Weigend (A) Scope of questionnaire (see Annex 1 and Annex 2) The questions in this Section generally deal with cyber crime. This term is understood to

More information

Introduction to Computer Science - PLTW #9340

Introduction to Computer Science - PLTW #9340 Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional

More information

CyberCivics: A Novel Approach to Reaching K-12 Students with the Social Relevance of Computing. Jim Owens and Jeanna Matthews Clarkson University

CyberCivics: A Novel Approach to Reaching K-12 Students with the Social Relevance of Computing. Jim Owens and Jeanna Matthews Clarkson University CyberCivics: A Novel Approach to Reaching K-12 Students with the Social Relevance of Computing Jim Owens and Jeanna Matthews Clarkson University Overview Definition of CyberCivics Motivation and introduction

More information

AC : THE ROLE OF INFORMATION WARFARE IN INFORMATION ASSURANCE EDUCATION: A LEGAL AND ETHICAL PERSPECTIVE

AC : THE ROLE OF INFORMATION WARFARE IN INFORMATION ASSURANCE EDUCATION: A LEGAL AND ETHICAL PERSPECTIVE AC 2007-2158: THE ROLE OF INFORMATION WARFARE IN INFORMATION ASSURANCE EDUCATION: A LEGAL AND ETHICAL PERSPECTIVE Andrew Hoernecke, Iowa State University Thad Gillispie, Iowa State University Benjamin

More information

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability

Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Legal Week s Corporate Counsel Forum 2016 Renaissance Harbour View Hotel 23 June 2016 Hong Kong Personal Data Protection Regulatory Framework From Compliance to Accountability Stephen Kai-yi Wong Privacy

More information

Course Outline Department of Computing Science Faculty of Science

Course Outline Department of Computing Science Faculty of Science Course Outline Department of Computing Science Faculty of Science COMP 2920 3 Software Architecture & Design (3,1,0) Fall, 2015 Instructor: Phone/Voice Mail: Office: E-Mail: Office Hours: Calendar /Course

More information