VALLIAMMAI ENGINEERING COLLEGE

Size: px
Start display at page:

Download "VALLIAMMAI ENGINEERING COLLEGE"

Transcription

1 VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK III SEMESTER MC7304 PROFESSIONAL ETHICS Regulation 2013 Academic Year Prepared by Mr. S.K. Saravanan, Assistant Professor (Sel.G) /MCA

2 SUBJECT VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER APPLICATIONS QUESTION BANK : MC7304 PROFESSIONAL ETHICS SEM / YEAR: III / II YEAR UNIT I - COMPUTER ETHICS INTRODCUTION ANDCOMPUTER HACKING A general Introduction Computer ethics: an overview Identifying an ethical issue- Ethics and law Ethical theories - Professional Code of conduct An ethical dilemma - A framework for ethical decision making - Computer hacking Introduction definition of hacking Destructive programs hacker ethics - Professional constraints BCS code of conduct To hack or not to hack? Ethical positions on hacking Q.No Questions PART - A BT Level Competence 1. Define Computer Ethics. 2. Define logical malleability. 3. Summarize the three kinds of invisibility factors. 4. Examine how one can identify ethical issues? 5. Illustrate the four guiding principles for understanding ethical issues and making informed decisions. 6. What is computer hacking? 7. Distinguish between Ethics and Law. 8. Classify the two ethical theories. 9. Define Kantianism. 10. Compose the key issues related to computer ethics. 11. Analyze Why computer ethics is unique? 12. Write about Utilitarianism theory. 13. Differentiate the Kantianism and Consequentialism theories. 14. Analyze the various issues for making ethical decisions. 15. Compose the motive behind the hacking. 16. Summarize Ethical Dilemma. 17. Predict the five principles values of hacker ethic. 18. Analyze Intrinsic and instrumental goods. 19. Define code of conduct. 20. Assess the important aspects of BCS code of conduct. PART - B

3 Describe the following (i) Importance of computer ethics (ii) To Identifying ethical Issues. (7+6) (i). Discuss about professional constraints in computer hacking. (5) (ii). Discuss about the ethical theory available for right action, self-interest and duty ethics. (8) (i) Compose the term computer Hacking (ii) Predict different types of Hackers (7+6) 4. Illustrate about (i) Kantianism (ii Utilitarianism (7+6) Explain the following (i) Intrinsic and Instrumental Value (ii) Acts versus rules (6+ 7) (i). What is the role and job description of an ethical hacker and what exactly they do for organizations? (6) (ii) Write notes on the ethical position on hacking ( 7) 7. Investigate the following (i) Worms (iii) Spyware (6+7) Illustrate about (i) the most common types of viruses. (ii) How to evaluate alternatives from various perspective in ethical decision making process (7+6) Write short notes on (i) Trojan Horses (ii) Bombs (iii) Denialof- service (5+ 4+4) Assess the following (i) principal values of Hacker Ethics (ii) Motives behind Hacking (7+6) Describe the relationship between ethics and laws with an 11. example. 12. Explain the different types of destructive programs (i) Compare the strength and weakness of Kantianism and Consequentialism theories (ii) How to Understanding ethical issues and making decisions with help of ethical framework? (7+6) Analyze the following (i) main arguments against hacking (ii) the main ethical defences of hacking. (7+6) PART - C 1. Compose : (i) BCS code of conduct in detail (ii) create the snapshot of key ethical theories (8+7) 2. Assess: (i) why do people write and spread destructive programs? How computer viruses and other destructive programs are spread? (8) (ii) Determine the frameworks for ethical decision making in detail (7) 3 Assess the professional code of conduct and their roles in detail. (15)

4 4 Examine about to hack or not to hack and ethical positions on hacking. justify (15) UNIT II - ASPECTS OF COMPUTER CRIME AND INTELLECTUAL PROPERTY Aspects of computer crime - Introduction - What is computer crime computer security measures Professional duties and obligations - Intellectual Property Rights The nature of Intellectual Property Intellectual Property Patents, Trademarks, Trade Secrets, Software Issues, Copyright The extent and nature of software piracy Ethical and professional issues free software and open source code PART - A Q.No Questions BT Competence Level 1. Define Computer crime. 2. Mention the different types of computer crime. 3. Identify the different types of computer fraud with an example. 4. Analyze the reasons for the corporate espionage. 5. Illustrate the various computer security measures. 6. What is meant by software audit control? 7. Construct the main duties and obligations of professionals 8. Define the term IPR. 9. Identify any four Ethical and professional issues in IPR. 10. Assess the advantages of Intellectual Property Rights. 11. What are patents? 12. Outline the term Copyright. 13. Assess the term trademark. 14. Illustrate the ways to violate trademark 15. Discuss some of the common software issues 16. Summarize the two agencies that protect copyright. 17. Differentiate between trademark, patent and copyright. 18. Define Software Piracy 19. Find out the various activities involved in software piracy 20. Compose the benefits of free and open source software. PART - B 1. What is computer crime? Describe the different types of computer crimes.

5 2. Discuss about (i) The main duties and obligations of professional. (6) (ii) Nature of Intellectual Property Rights (7) What is meant by corporate Espionage? Illustrate the various reasons of Corporate Espionage. Illustrate (i) computer technology and intellectual property (ii) List some features of Intellectual Properties. (7+6) 5. Compose (i) Unauthorized use of computer at work (i) Harassment and sexually-related Material(6+7) Analyze the following (i) Firewall (ii) Key strength of password (7+6) Define Encryption. Describe the various types of Encryption. Describe the following (i) Antivirus Software (ii)biometrics (7+6) Assess the concepts of (i) Audit Control Software (ii) Access Control (8+5) 1 Remembering 10. Describe about (i) Copy Right (ii) Patents (8+5) 11. Explain in detail about (i) Trade Marks (ii) Trade Secrets (8+5) 12. Hacking Tactics (ii) ) Some common software issues. Describe the following (i) some examples of Common 13. (6+7) Identify the following (i) Extent and nature of software piracy (ii) Ways to minimize the software Piracy. (7+6) 14. Analyze about (i) Main Ethical and Professional issues (ii) Benefits of Free and Open Source Software. (7+6) PART - C 1. (i) Propose the various computer security measures with its limitations (ii) Invent how is Due diligence different from due care and why are both important? (10+5) 2. (i) What is intellectual property? Explain the various types of intellectual property in details (ii) Summarize the differences between free software and open source software.(10+5) 3. Define Computer fraud. Discuss about the various techniques for computer fraud. (15) 4. What is software Piracy? Explain different activities in software piracy. (15)

6 UNIT III - REGULATING INTERNET CONTENT, TECHNOLOGY AND SAFETY Introduction In defence of freedom expression censorship laws upholding free speech Fr peech and the Internet - Ethical and professional issues - Internet technologies and privacy Safety a isk assessment of safety and risk risk benefit analysis reducing risk PART - A Q.No Questions BT Level Competence 1 Define Free Speech. 2 Illustrate the laws restricting Free Speech 3 Summarize the intellectual consequences of Denial of Free Speech. Define Censorship. 4 5 Discuss the merits of censorship in regulating internet content. 6 Differentiate between self-censorship and soft censorship. 7 List out the most problematic forms of speech on the internet. 8 Analyze the internet privacy. 9 What contents must be filtered or blocked from Internet? 10 Compose anonymity on the internet. 11 Examined about chained r ing. 12 Discuss out some ethical and professional issues. 13 Illustrate the privacy in an information security context. 14 What is meant by cancelbot? 15 What is meant by risk benefit analysis? 16 Invent some of Risk exposure assessment What is safety? Give an example. Give the outline to assess the risks in workplace. Assess some of the advantages of RFID. 20 Define Cookie. PART - B Describe the following (i) types of regulatory options (ii) Defence of freedom Expression (7+6) Describe (i) Laws upholding free Speech (ii) Laws restricting free speech (7+6) Analyze the following (i) Types of censorship tools (ii) Anonymous Expression for and against (6+7) Describe about (i) Internet Technologies supporting Free Speech (ii) Internet Technologies Tools for censorship (6+7)

7 Assess the various impact of computer technology over privacy. Explain the following (i) Cookies (ii) Spam (7+6) Analyze the concept of RFID along with its implications and advantages. Illustrate about (i) List out the various types of risks. Explain (ii) How to reduce risks? Examine the various steps involved in reducing the risks.(7+6) Compose the concepts of safety and risk assessment in detail. Describe about the Risk benefit analysis with an example. Describe about the personal and public risk with example. Explain the following (i) Cookies (ii) Spam (7+6) Illustrate the ethical and professional issues in Internet. Explain the following (i) improved safety with an example (ii) When testing is inappropriate for safety. (7+6) PART - C (i) Construct the technical and non-technical internet content censorship methods in detail. (ii) Compose the pros and cons of freedom of expression on the internet? (10+5) (i) Choose the various types of risk assessment and how does it relate to information technology specifically and explain mechanisms for reducing risks? (ii) Assess the importance of regulating internet content in detail. (8+7) Compose the information about Free speech and the internet in briefly. (15) Explain the impact of information technology on privacy and how can information technology itself solve Concerns. (15) UNIT IV - COMPUTER TECHNOLOGIES ACCESSIBILITY ISSUES Introduction Principle of equal access Obstacles to access for individuals professional responsibility - Empowering computers in the workplace Introduction computers and employment computers and the quality of work computerized monitoring in the work place telecommuting social, legal and professional issues - Use of Software, Computers and Internetbased Tools Liability for Software errors - Documentation Authentication and Control Software engineering code of ethics and practices IEEE-CS ACM Joint task force PART - A

8 Q.No Questions BT Competence Level 1 Define professional responsibilities. 2 List out the principles of equal access 3 Investigate various obstacles to access for individuals 4 Illustrate any four accessibility issue in computer technology 5 Examine the relations between computer and quality of work. 6 Debate the advantages and disadvantage of computerized monitoring in the work place. 7 Analyze the several factors for determination of liability for computer aided mistakes 8 State some reasons for the impact of new technology was not as great as envisaged. 9 Distinguish between the legal and professional issues 10 Define Institutional Authority 11 Outline the guidelines to reach an agreement. 12 Give some rules of professional conduct. 13 Define Shareware. 14 What is meant by telecommuting? 15 State some of the drawback of telecommuting 16 Assess purposes for using internet based tools? 17 Define EIM. 18 Compose the different types of software documentation. 19 What is authentication? 20 Verify the key challenges are facing in software engineering? PART - B 1 Analyze the following (i) The broader consequences of equal access (ii) Enabling the technology for disabled people. (6+7) 2 Assess the various Rules of professional conduct in detail. Examine the following (i) Roles of computers in 3 Employment (ii) Health and safety Hazards in IT Industry. (7+6) 4 What is Telecommuting and What are benefits and limitations of telecommuting? ii) How the uses of computers improve the quality of work? Explain. (7+6)

9 Illustrate the social, legal and professional issues in work place monitoring. (i) Explain how computer can be used ethically? (ii) Give the outline of Uses of Software and its Classification. (7+6) Compose the following (i) arguments for and against monitoring in workplace (ii) The code of ethics on workplace monitoring. (8+5) Discuss the various benefits and effects of computer monitoring in the workplace Describe about the Liability for software errors in detail. Discuss following (i) Duty to employers and clients (ii) Duty to the profession (7+6) Describe about (i) Key Challenges are facing software engineering (ii)professional and ethical responsibility of the software engineer. (7+ 6) Discuss about some common points related to use of Internet based tools for Ethics. Show the eight principles of software engineering code of ethics in detail. (i). Investigate the area covered in ethical decision making. (ii) Identify the uses of computers ethically. (7+6) PART - C 1. Propose the Principles of equal access, obstacles to access for individuals and professional responsibility in computer technology accessibility issues. (15) i) Assess IEEE CS/ACM Software engineering code of 2. ethics and professional practice(10) (ii) Determine various obstacles to information access for individual (5) 3. Explain briefly the documentation authentication and control. (15) 4. Highlight impact of information technology on privacy and explain how information technology can address these issues. (15) UNIT V - SOFTWARE DEVELOPMENT AND SOCIAL NETWORKING Software Development strategies for engineering quality standards Quality manageme tandards Social Networking Company owned social network web site the use of soc etworks in the hiring process Social Networking ethical issues Cyber bullying cyber stalking Online virtual world Crime in virtual world - digital rights management - Online defamation Pira Fraud

10 PART - A Q.No Questions BT Competence Level 1 Illustrate the various factors influencing software Quality. 2 Differentiate between SSDLC and SDLC. 3 State some activities of Quality Management. 4 Define social networking. 5 Illustrate the uses of social networks in the hiring process 6 Summarize the various issues for social networking Web sites. 7 What is meant by SOPA? 8 Difference between Paid, Owned and Earned media. 9 Analyze about MMORPG and Avatar. 10 Debate Thin copy right and Thick copy right in DRM. 11 Create the list for frequently busted online fraud. 12 What are virtual crimes? 13 Define cyber bullying. 14 Define cyber- stalking. 15 Debate the difference between Marketing and Virtual Marketing. 16 Define online defamation. 17 Define Internet piracy. 18 Illustrate the benefits of online virtual world. 19 Outline about spoofing. 20 What is meant by malware? PART - B Describe the following (i) the causes for poor software quality. (ii) the importance of software Quality. (5+8) Determine in detail about the phases of SDLC? Illustrate about (i) different strategies of software design (ii) Different levels of testing (7+6) 4 Discuss about (i) Failure Mode and Effects analysis(fema) with example (ii) Tick IT (7+6) 5 (i) compose the need of ISO 9001 certification for software industries (6) (ii) Distinguish manufacturing and software industries with respect to ISO9000 Certification. (7)

11 Describe the Characteristics of (i) Cyber bullying (ii) Cyber stalking (7+6) Explain about the key ethical issues associated with the use of social networking websites. Describe the categories of threads in online Virtual World. Illustrate about (i) Social Networking Advertising strategies (ii) Uploading of inappropriate Material in Social Networking (7+6) What is virtual world? Discuss about the crimes in the virtual world. Explain the following (i) the major functionality of DRM (ii) Online Defamation (7+6) Describe about the various DRM Techniques. Analyze the various types of online piracy with an example. Explain the various types of online fraud with examples. PART - C 1. Propose Quality Management Standard. Design the various standards available for engineering quality. (3+12) (i). Assess the various strategies for engineering quality software in details. (8) (ii) Verify the use of social networks in the hiring process. (7) Compose the various social networking ethical issues in detail. (15) Explain about DRM is used to control the use of digital content in the virtual world securely. (15)

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics

A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase. Term Paper Sample Topics A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology (Fourth edition) by Sara Baase Term Paper Sample Topics Your topic does not have to come from this list. These are suggestions.

More information

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062

Computer Ethics. Dr. Aiman El-Maleh. King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Computer Ethics Dr. Aiman El-Maleh King Fahd University of Petroleum & Minerals Computer Engineering Department COE 390 Seminar Term 062 Outline What are ethics? Professional ethics Engineering ethics

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 II SEMESTER CC5291- DESIGN FOR MANUFACTURE, ASSEMBLY AND ENVIRONMENTS Regulation 2017 Academic Year 2017 18 Prepared by Mr. K.VENKATESAN, Assistant Professor (O.G) SRM

More information

Ethical and social aspects of management information systems

Ethical and social aspects of management information systems Ethical and social aspects of management Marcos Sanches Commerce Électronique The challenge Why are contemporary and the Internet a challenge for the protection of privacy and intellectual property? How

More information

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm

Managing Information Systems Seventh Canadian Edition. Laudon, Laudon and Brabston. CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm Managing Information Systems Seventh Canadian Edition Laudon, Laudon and Brabston CHAPTER 4 Social, Ethical, and Legal Issues in the Digital Firm 4-1 Online activity is tracked and ads are displayed depending

More information

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents

More information

Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p.

Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. Preface p. xix Catalysts for Change p. 1 Introduction p. 2 Milestones in Computing p. 6 Mechanical Adding Machines p. 6 The Analytical Engine p. 9 Boolean Algebra p. 10 Zuse's Z Series p. 11 Harvard Mark

More information

Innovation and Technology Law Curriculum

Innovation and Technology Law Curriculum Innovation and Technology Law Curriculum Core Courses FOUNDATIONS OF PRIVACY LAW (FALL 2016) This course explores the principles of privacy law in relation to the affairs of government, non-government

More information

CS 305: Social, Ethical and Legal Implications of Computing

CS 305: Social, Ethical and Legal Implications of Computing CS 305: Social, Ethical and Legal Implications of Computing Prof. Andrew P. Black black@cs.pdx.edu 1 We will be right back, after these messages Do you know about PCEP? PCEP is the PSU/PDX Cooperative

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 60 0. DEPARTMENT OF ELECTRICAL AND ELECTRONICS ENGINEERING QUESTION BANK VII SEMESTER EE6005 Power Quality Regulation 0 Academic Year 07 8 Prepared

More information

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi

Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi Computer Ethics(1) IT Engineering II Instructor: Ali B. Hashemi 1 1 Main Points Computer Ethics Set of rules or standards of behavior for dealing with computer technology Academic field of study Examples

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK Degree & Branch : B.E C.S.E. Year & Semester : II / IV Section : CSE 1 & 2

More information

Mountain Brook High School

Mountain Brook High School Mountain Brook High School Technology Operations and Concepts 1. Use accurate terminology related to technology. Use appropriate terminology related to technology. 2. Utilize advanced features of word

More information

All information is correct at the time of print and is subject to change without prior notice.

All information is correct at the time of print and is subject to change without prior notice. INFO KIT Copyright Message 2011. Copyright Prestariang Systems (No: 630804-K). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic

More information

CS 4001 Possible Term Paper Topics

CS 4001 Possible Term Paper Topics CS 4001 Possible Term Paper Topics Your topic does not have to come from this list. These are suggestions. The brief comments and questions for each topic are just a few ideas to spark your imagination

More information

University of Asia Pacific (UAP) Department of Law and Human Rights

University of Asia Pacific (UAP) Department of Law and Human Rights University of Asia Pacific (UAP) Department of Law and Human Rights COURSE OUTLINE Program LLB (Honors) Course Code Law 349: Cyber Law and Intellectual Property Law & Title Level 3 rd Year 2 nd Semester

More information

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards CSTA K- 12 Computer Science s: Mapped to STEM, Common Core, and Partnership for the 21 st Century s STEM Cluster Topics Common Core State s CT.L2-01 CT: Computational Use the basic steps in algorithmic

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Antitrust 1. Anti-Counterfeiting for Licensed Products: What You Don't Know Can Hurt Your Business 2. Antitrust Investigations:

More information

Indiana K-12 Computer Science Standards

Indiana K-12 Computer Science Standards Indiana K-12 Computer Science Standards What is Computer Science? Computer science is the study of computers and algorithmic processes, including their principles, their hardware and software designs,

More information

Computer and Information Ethics

Computer and Information Ethics Computer and Information Ethics Instructor: Viola Schiaffonati May,4 th 2015 Ethics (dictionary definition) 2 Moral principles that govern a person's behavior or the conducting of an activity The branch

More information

2009 New Jersey Core Curriculum Content Standards - Technology

2009 New Jersey Core Curriculum Content Standards - Technology P 2009 New Jersey Core Curriculum Content s - 8.1 Educational : All students will use digital tools to access, manage, evaluate, and synthesize information in order to solve problems individually and collaboratively

More information

COLLABORATIVE R&D & IP ISSUES IN TECHNOLOGY TRANSFER IN UNIVERSITY SYSTEM

COLLABORATIVE R&D & IP ISSUES IN TECHNOLOGY TRANSFER IN UNIVERSITY SYSTEM COLLABORATIVE R&D & IP ISSUES IN TECHNOLOGY TRANSFER IN UNIVERSITY SYSTEM Avinash Kumar Addl. Dir (IPR) DRDO HQ, DRDO Bhawan, Rajaji Marg New Delhi- 100 011 avinash@hqr.drdo.in IPR Group-DRDO Our Activities

More information

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade

Bibb County School District Technology Scope and Sequence Kindergarten - 12 th Grade Bibb County School District Technology Scope and Sequence indergarten - 12 th Grade Students will 1 2 3 5 Technology Operations and Concepts 1 Use accurate terminology related to technology. Use appropriate

More information

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics

Chapter 4. L&L 12ed Global Ed ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS. Information systems and ethics MANAGING THE DIGITAL FIRM, 12 TH EDITION, GLOBAL EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific

More information

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS

Management Information Systems MANAGING THE DIGITAL FIRM, 12 TH EDITION. Chapter 4 ETHICAL AND SOCIAL ISSUES IN INFORMATION SYSTEMS MANAGING THE DIGITAL FIRM, 12 TH EDITION Chapter 4 ETHICAL AND SOCIAL ISSUES IN Learning Objectives What ethical, social, and political issues are raised by information systems? What specific principles

More information

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE

SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE SAULT COLLEGE OF APPLIED ARTS AND TECHNOLOGY SAULT STE. MARIE, ONTARIO COURSE OUTLINE COURSE TITLE: Technology and Society CODE NO. : SEMESTER: ANY PROGRAM: AUTHOR: General Education Course (any program)

More information

Digital Citizenship Continuum

Digital Citizenship Continuum Digital Citizenship Continuum -curricular Competencies (Develop Thinking, Develop Identity and Interdependence, Develop Literacies, and Develop Social Responsibility) support student achievement and the

More information

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break

2/28/2018 POWER CONFERENCE ETHICS SESSION FORMAT OF SESSION LEARNING OBJECTIVES. Part 1: Changes to the Code of Ethics Break POWER CONFERENCE ETHICS SESSION Amy Kalb, DSW FORMAT OF SESSION Part 1: Changes to the Code of Ethics Break Part 2: Strategies for Addressing Ethical Dilemmas Break Part 3: Practice Session Small group

More information

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14

Required Course Numbers. Test Content Categories. Computer Science 8 12 Curriculum Crosswalk Page 2 of 14 TExES Computer Science 8 12 Curriculum Crosswalk Test Content Categories Domain I Technology Applications Core Competency 001: The computer science teacher knows technology terminology and concepts; the

More information

Introduction to Computer Science - PLTW #9340

Introduction to Computer Science - PLTW #9340 Introduction to Computer Science - PLTW #9340 Description Designed to be the first computer science course for students who have never programmed before, Introduction to Computer Science (ICS) is an optional

More information

Supplemental end user software license agreement terms

Supplemental end user software license agreement terms Terms of Service Docusign, Inc. Supplemental end user software license agreement terms These Supplemental Terms and Conditions (the "Terms") govern your ("Customer") use of the DocuSign Subscription Service,

More information

Information Communication Technology

Information Communication Technology # 115 COMMUNICATION IN THE DIGITAL AGE. (3) Communication for the Digital Age focuses on improving students oral, written, and visual communication skills so they can effectively form and translate technical

More information

Children s rights in the digital environment: Challenges, tensions and opportunities

Children s rights in the digital environment: Challenges, tensions and opportunities Children s rights in the digital environment: Challenges, tensions and opportunities Presentation to the Conference on the Council of Europe Strategy for the Rights of the Child (2016-2021) Sofia, 6 April

More information

NASW Code of Ethics Revisions Effective January 1, 2018

NASW Code of Ethics Revisions Effective January 1, 2018 NASW Code of Ethics 2017 Revisions Effective January 1, 2018 History 1965 1 st Unified Code only 1 page Revisions: 1979, mid-80s, early 90s, 96, 99 No such thing as Facebook, virtual therapy 2008 2018

More information

Alabama Course of Study Digital Literacy and Computer Science Grade 8

Alabama Course of Study Digital Literacy and Computer Science Grade 8 A Correlation of Computer Programming Fundamental Concepts Using Java 2017 To the Alabama Course of Study Digital Literacy and Computer Science Grade 8 Recurring Standards for Digital Literacy and Computer

More information

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the

Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the Testimony of Professor Lance J. Hoffman Computer Science Department The George Washington University Washington, D.C. Before the U. S. Senate Committee on Commerce, Science, and Transportation Subcommittee

More information

A Model for Incorporating Ethics Instruction into the OEIS Curriculum

A Model for Incorporating Ethics Instruction into the OEIS Curriculum A Model for Incorporating Ethics Instruction into the OEIS Curriculum Herman T. Tavani This article proposes a framework for incorporating ethics instruction into the OEIS Model Curriculum by drawing upon

More information

ALA s Core Competences of Librarianship

ALA s Core Competences of Librarianship ALA s Core Competences of Librarianship Final version Approved by the ALA Executive Board, October 25 th 2008 Approved and adopted as policy by the ALA Council, January 27 th 2009 This document defines

More information

Trade Secret Protection of Inventions

Trade Secret Protection of Inventions Trade Secret Protection of Inventions Phil Marcoux & Kevin Roe Inventions - Trade Secret or Patent? Theft by employees, executives, partners Theft by contract Note - this class does not create an attorney-client

More information

Winthrop Primary School

Winthrop Primary School Winthrop Primary School Information Communication Technology Plan & Scope and Sequence (DRAFT) 2015 2016 Aim: To integrate across all Australian Curriculum learning areas. Classroom teachers delivering

More information

Individual Test Item Specifications

Individual Test Item Specifications Individual Test Item Specifications 8208110 Game and Simulation Foundations 2015 The contents of this document were developed under a grant from the United States Department of Education. However, the

More information

Professional and ethical responsibility

Professional and ethical responsibility Professional and ethical responsibility Software engineering involves wider responsibilities than simply the application of technical skills. Software engineers must behave in an honest and ethically responsible

More information

Robert Bond Partner, Commercial/IP/IT

Robert Bond Partner, Commercial/IP/IT Using Privacy Impact Assessments Effectively robert.bond@bristows.com Robert Bond Partner, Commercial/IP/IT BA (Hons) Law, Wolverhampton University Qualified as a Solicitor 1979 Qualified as a Notary Public

More information

Getting on the same page

Getting on the same page Getting on the same page Readings - make sure you keep up General Ethical concepts do a little research, read Johnson chapter SE Code of Ethics reading (pop quiz) Paper proposal coming up! What is the

More information

Information Sociology

Information Sociology Information Sociology Educational Objectives: 1. To nurture qualified experts in the information society; 2. To widen a sociological global perspective;. To foster community leaders based on Christianity.

More information

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers

Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers Tuning-CALOHEE Assessment Frameworks for the Subject Area of CIVIL ENGINEERING The Tuning-CALOHEE Assessment Frameworks for Civil Engineering offers an important and novel tool for understanding, defining

More information

GLOBALIZATION AND TECHNOLOGY

GLOBALIZATION AND TECHNOLOGY GLOBALIZATION AND TECHNOLOGY The world can, in many ways, be seen as a single, interconnected society. T his is called globalization, and it has been made possible by innovations in transportation technology

More information

Building DIGITAL TRUST People s Plan for Digital: A discussion paper

Building DIGITAL TRUST People s Plan for Digital: A discussion paper Building DIGITAL TRUST People s Plan for Digital: A discussion paper We want Britain to be the world s most advanced digital society. But that won t happen unless the digital world is a world of trust.

More information

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use:

Executive Summary Industry s Responsibility in Promoting Responsible Development and Use: Executive Summary Artificial Intelligence (AI) is a suite of technologies capable of learning, reasoning, adapting, and performing tasks in ways inspired by the human mind. With access to data and the

More information

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum

Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Teaching a Course on Social Implications of Computing in Undergraduate Curriculum Narayan Debnath, Eugene Lundak, Paul Schumacher Computer Science Department Winona State University Winona, MN 55987 e-mail:

More information

Danielle Vanderzanden

Danielle Vanderzanden Danielle Vanderzanden Shareholder Boston 617-994-5724 dani.vanderzanden@ogletreedeakins.com Ms. Vanderzanden is a Shareholder in the Boston Office and Co-Chair of the Firm s Data Privacy Practice Group.

More information

NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ)

NJ Department of Education Office of Educational Technology Digital Learning NJ (DLNJ) 8.2 Technology Education, Engineering, Design, and Computational Thinking-Programming: All students will develop an understanding of the nature and impact of technology, engineering, technological design,

More information

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203. DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING QUESTION BANK SUBJECT : EC6404 LINEAR INTEGRATED CIRCUITS SEM / YEAR: IV / II year

More information

QUESTION BANK PART - A

QUESTION BANK PART - A QUESTION BANK SUBJECT: EE6005-Power Quality SEM / YEAR: VII SEMESTER / ACADEMIC YEAR 08-09 UNIT I - INTRODUCTION TO POWER QUALITY Terms and definitions: Overloading - under voltage - over voltage. Concepts

More information

Violent Intent Modeling System

Violent Intent Modeling System for the Violent Intent Modeling System April 25, 2008 Contact Point Dr. Jennifer O Connor Science Advisor, Human Factors Division Science and Technology Directorate Department of Homeland Security 202.254.6716

More information

Additional Arduino Control & Ethics

Additional Arduino Control & Ethics Additional Arduino Control & Ethics 1 Objectives Outline engineering ethics Emphasize importance of project documentation Discuss Servo Function calls and uses Questions Ethics & Practicing Engineering

More information

"Workshops on key economic issues regarding the. enforcement of IPR in the European Union"

Workshops on key economic issues regarding the. enforcement of IPR in the European Union Ref. Ares(2015)2133028-21/05/2015 Call for expression of interest: "Workshops on key economic issues regarding the enforcement of IPR in the European Union" Background With Directive 2004/48/EC on the

More information

MARITIME MANAGEMENT MASTER S DEGREE (ONLINE) Train for a leading role in maritime-based organizations.

MARITIME MANAGEMENT MASTER S DEGREE (ONLINE) Train for a leading role in maritime-based organizations. MARITIME MANAGEMENT MASTER S DEGREE (ONLINE) Train for a leading role in maritime-based organizations. PROGRAM DESCRIPTION The Master of Maritime Management (MMM) is an innovative program, the first of

More information

integrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies

integrity, honor and dignity knowledge and skill honest and impartial increase the competence professional and technical societies Engineering Ethics Code of Ethics Engineering Professional Engineering Organizations American Society of Civil Engineers (http://www.asce.org/inside/codeofethics.cfm) Fundamental Principles Engineers uphold

More information

Ethics and technology

Ethics and technology Professional accountants the future: Ethics and technology International Ethics Standards Board for Accountants (IESBA) 19 June 2018 Agenda ACCA Professional Insights (PI) and technology Technology impact

More information

DRAFT 2016 CSTA K-12 CS

DRAFT 2016 CSTA K-12 CS 2016 CSTA K-12 CS Standards: Level 1 (Grades K-5) K-2 Locate and identify (using accurate terminology) computing, input, and output devices in a variety of environments (e.g., desktop and laptop computers,

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines

Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines Fifth Edition Fiscal 2007 Environmental Technology Verification Pilot Program Implementation Guidelines April 2007 Ministry of the Environment, Japan First Edition: June 2003 Second Edition: May 2004 Third

More information

Media Literacy Policy

Media Literacy Policy Media Literacy Policy ACCESS DEMOCRATIC PARTICIPATE www.bai.ie Media literacy is the key to empowering people with the skills and knowledge to understand how media works in this changing environment PUBLIC

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203. DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING SUBJECT QUESTION BANK : EC6401 ELECTRONICS CIRCUITS-II SEM / YEAR: IV / II year B.E.

More information

Artificial Intelligence, Business, and the Law

Artificial Intelligence, Business, and the Law Artificial Intelligence, Business, and the Law Cory Fisher cwfisher@shb.com ar ti fi cial in tel li gence /ˌärdəˈfiSHəl inˈteləjəns/ Noun the capability of a machine to imitate intelligent human behavior

More information

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology

Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Privacy, Due Process and the Computational Turn: The philosophy of law meets the philosophy of technology Edited by Mireille Hildebrandt and Katja de Vries New York, New York, Routledge, 2013, ISBN 978-0-415-64481-5

More information

50 West Liberty Street Suite 400 Reno, NV main: (775) direct: (702) fax: (775)

50 West Liberty Street Suite 400 Reno, NV main: (775) direct: (702) fax: (775) Shareholder 3960 Howard Hughes Parkway Suite 300 Las Vegas, NV 89169 main: (702) 862-8800 direct: (702) 862-7700 fax: (702) 862-8811 phicks@littler.com 50 West Liberty Street Suite 400 Reno, NV 89501 main:

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

VALLIAMMAI ENGINEERING COLLEGE SRM NAGAR KATTANKULATHUR DEPARTMENT OF MECHANICAL ENGINEERING ME6504 METROLOGY AND MEASUREMENTS QUESTION BANK

VALLIAMMAI ENGINEERING COLLEGE SRM NAGAR KATTANKULATHUR DEPARTMENT OF MECHANICAL ENGINEERING ME6504 METROLOGY AND MEASUREMENTS QUESTION BANK VALLIAMMAI ENGINEERING COLLEGE SRM NAGAR KATTANKULATHUR DEPARTMENT OF MECHANICAL ENGINEERING ME6504 METROLOGY AND MEASUREMENTS QUESTION BANK UNIT I BASICS OF METROLOGY 1. What are the uses of measurement?

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies

Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Robin Mansell and Brian S. Collins Introduction: Trust and crime in information societies Book section Original citation: Mansell, Robin and Collins, Brian S. (2005) Introduction: Trust and crime in information

More information

Industrial and Manufacturing Systems

Industrial and Manufacturing Systems Sets Focus Area: with Performance (KS/PI) Industrial and Manufacturing Systems ENPG02.01 Demonstrate effective oral, written, and visual communication related to industrial and manufacturing systems. ENPG02.01.01.00

More information

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors

POLICY PHILOSOPHY DEFINITIONS AC.2.11 INTELLECTUAL PROPERTY. Programs and Curriculum. APPROVED: Chair, on Behalf of SAIT s Board of Governors Section: Subject: Academic/Student (AC) Programs and Curriculum AC.2.11 INTELLECTUAL PROPERTY Legislation: Copyright Act (R.S.C., 1985, c.c-42); Patent Act (R.S.C., 1985, c.p-4); Trade-marks Act (R.S.C.

More information

CILIP Privacy Briefing 2017

CILIP Privacy Briefing 2017 CILIP Privacy Briefing 2017 Tuesday 28 November 2017 #CILIPPrivacy17 Privacy, surveillance and the information profession: challenges, qualifications, and dilemmas? David McMenemy, Lecturer and Course

More information

Chapter 4 INFORMATION SYSTEMS

Chapter 4 INFORMATION SYSTEMS Chapter 4 MANAGING THE DIGITAL FIRM, 12 TH EDITION ETHICAL AND SOCIAL ISSUES IN VIDEO CASES Case 1: Big Brother is Copying Everything on the Internet Case 2: Delete: The Virtue of Forgetting in a Digital

More information

Data Acquisition, Management, Sharing and Ownership

Data Acquisition, Management, Sharing and Ownership Data Acquisition, Management, Sharing and Ownership University of Ibadan MEPI-J program 1 What are data? Research Data are ".. the recorded factual material commonly accepted in the scientific community

More information

Getting Started. This Lecture

Getting Started. This Lecture Getting Started Entrepreneurship (MGT-271) Lecture 9-11 This Lecture Intellectual Property Rights Forms of intellectual property Patent, its types and steps to obtaining patent Potential financing sources

More information

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu)

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu) Published on Policies and Procedures (http://policy.arizona.edu) Home > Intellectual Property Policy Policy Contents Purpose and Summary Scope Definitions Policy Related Information* Revision History*

More information

Security in the "Digital Society" - New Risks and their Management

Security in the Digital Society - New Risks and their Management Security in the "Digital Society" - New Risks and their Management Herbert Burkert * 1 INTRODUCTION 2 NEW RISKS 2.1 TYPES OF RISKS IN THE DIGITAL SOCIETY 2.1.1 Infrastructural Risks 2.1.2 Communication

More information

Lecture for January 25, 2016

Lecture for January 25, 2016 Lecture for January 25, 2016 ECS 235A UC Davis Matt Bishop January 25, 2016 ECS 235A, Matt Bishop Slide #1 Example English Policy Computer security policy for academic institution Institution has multiple

More information

Chinese Intellectual Property Right Regime and Independent Innovation of Enterprises

Chinese Intellectual Property Right Regime and Independent Innovation of Enterprises Chinese Intellectual Property Right Regime and Independent Innovation of Enterprises Dr. Sun Jian Applied Economic Research Center, Ocean University of China Outline The Development of Chinese IPR Regime

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

Entrepreneurship WILEY. Third Edition. William D. Bygrave. Andrew Zacharakis. Babson College. Babson College

Entrepreneurship WILEY. Third Edition. William D. Bygrave. Andrew Zacharakis. Babson College. Babson College Entrepreneurship Third Edition William D. Bygrave Babson College Andrew Zacharakis Babson College WILEY CONTENTS i. Preface vii 3 Opportunity Recognition/Shaping, and Reshaping 79 1. The Power of. Entrepreneurship

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF ELECTRONICS AND INSTRUMENTATION ENGINEERING QUESTION BANK VI SEMESTER EI6601 Modern Electronic Instrumentation Regulation

More information

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework

2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework 2016 Massachusetts Digital Literacy and Computer Science (DLCS) Curriculum Framework June 2016 Massachusetts Department of Elementary and Secondary Education 75 Pleasant Street, Malden, MA 02148-4906 Phone

More information

Technology Trust for Government and Private Sector: Approach Technologies Acceptance Model (TAM)

Technology Trust for Government and Private Sector: Approach Technologies Acceptance Model (TAM) Technology Trust for Government and Private Sector: Approach Technologies Acceptance Model (TAM) Moahamad Ikmal Hamid, Patirah Hanapi and Norhayati Hussin Faculty Information Management, University Technology

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

CSE468 Information Conflict

CSE468 Information Conflict CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview Reference Sources and Bibliography NOTE: There are a limited number of publications available

More information

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems

MANAGEMENT INFORMATION SYSTEMS. Chapter 4 Ethical and Social Issues in Information Systems MANAGEMENT INFORMATION SYSTEMS Chapter 4 Ethical and Social Issues in Information Systems Mohammad Najjar, PhD, MBA, BSc Operations & Supply Chain Management Learning Objectives 1. Identify ethical, social

More information

General requirements for broadcastoriented applications of integrated

General requirements for broadcastoriented applications of integrated Recommendation ITU-R BT.2037 (07/2013) General requirements for broadcastoriented applications of integrated broadcast-broadband systems and their envisaged utilization BT Series Broadcasting service (television)

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF ELECTRONICS AND INSTRUMENTATION ENGINEERING QUESTION BANK IV SEMESTER EI6402 ELECTRICAL MACHINES Regulation 2013 Academic

More information

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition

EXIN Privacy and Data Protection Foundation. Preparation Guide. Edition EXIN Privacy and Data Protection Foundation Preparation Guide Edition 201701 Content 1. Overview 3 2. Exam requirements 5 3. List of Basic Concepts 9 4. Literature 15 2 1. Overview EXIN Privacy and Data

More information

The Need for Computer Ethics Course for the Students of CSE/CS or Equivalent Discipline in Bangladesh

The Need for Computer Ethics Course for the Students of CSE/CS or Equivalent Discipline in Bangladesh IIUC STUDIES ISSN 1813-7733 Vol.- 9, December 2011 (p 307-322) The Need for Computer Ethics Course for the Students of CSE/CS or Equivalent Discipline in Bangladesh Md. Monirul Islam * Mohammed Shamsul

More information

Texts in Computer Science

Texts in Computer Science Texts in Computer Science Editors David Gries Fred B. Schneider For further volumes: http://www.springer.com/series/3191 Joseph Migga Kizza Ethical and Social Issues in the Information Age Fifth Edition

More information

Innovation, Intellectual Proper ty Rights and Indian Railways

Innovation, Intellectual Proper ty Rights and Indian Railways Innovation, Intellectual Proper ty Rights and Indian Railways State of play and a case for a policy on Innovation and Intellectual Property Promotion and Protection (2i3p) Presentation before Financial

More information

Efese, ethics in research

Efese, ethics in research faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017 1 Efese, ethics in research Spetses, June 2017 Dr. Aline Klingenberg faculty of law staatsrecht, bestuursrecht & bestuurskunde 02-06-2017

More information

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019

Human RFID Implants: The Good And Bad ECE Engineering Ethics and Professionalism Robert Billette February 12, 2019 Human RFID Implants: The Good And Bad ECE 390 - Engineering Ethics and Professionalism Robert Billette February 12, 2019 BACKGROUND We live in a complex technological universe where it seems a new device

More information

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009

Legislative and Regulatory Update. Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 Legislative and Regulatory Update Diane Bowers, CASRO President CASRO Data Collection Conference November 19, 2009 2009 Pharma market research state and Federal Massachusetts Vermont Minnesota Proposed

More information

One App at a Time: How Technology Promotes Safety in the Design & Construction Industry

One App at a Time: How Technology Promotes Safety in the Design & Construction Industry One App at a Time: How Technology Promotes Safety in the Design & Construction Industry RLI Design Professionals DPLE 290 May 16, 2018 RLI Design Professionals is a Registered Provider with The American

More information