Outcomes Based Course Outline Revision

advertisement

Butler Community College

Career and Technical Education

Division

COURSE OUTLINE

Information Technology Ethics

Skyler Lovelace

Revised Spring 2010

Implemented Spring 2011

Textbook Update Fall 2014

Course Description

IN 275. Information Technology Ethics. 3 hours credit. Prerequisite: Completion of 12 credit hours of Information Technology department courses, with a C or better earned in each course. This course will enable the student to appraise ethical issues that information technology professionals face in a corporate setting. The student will examine the classical normative ethical theories based on notions of duties, rights, consequences and virtue based ethics as well as the contemporary codes of conduct established by professional organizations. The student will explore, analyze, and critique case studies in order to develop skills in ethical thought and written communication.

Course Relevance

Ethical decision-making when working with technology has become increasingly important because corporate risks associated with inappropriate decisions have grown. Information technology professionals should be able to identify various ethical problems in advance of a corporate crisis and be able to propose appropriate responses with clearly articulated justifications for action. In order to make appropriate decisions, information technology professionals should be able to use the conceptual tools found in modern philosophical ethics and be informed about the ethical standards of their profession.

Required Materials

Quinn, M., Ethics for the information age. Boston, MA: Addison Wesley.

* - For complete textbook information, refer to http://www.butlercc.bkstr.com

Learning Outcomes

The intention is for the student to be able to:

1. Apply ethical principles to technology issues.

2. Present views on ethical issues in a clear and precise manner in discussion and written documents.

Learning PACT Skills that will be developed and documented in this course

Through involvement in this course, the student will develop ability in the following PACT skill area(s):

Analytical Thinking Skills

1. Critical thinking

IN 275 Information Technology Ethics 1

Through reading about and discussing ethical issues, the student will build skills in formulating responses grounded in sound critical thinking.

Communication Skills

1. Creation and delivery of messages

Through writing responses to case studies, the student will practice writing skills and use of standard English.

Major Summative Assessment Task(s)

These learning outcome(s) and the Learning PACT skill(s) will be demonstrated by:

1. Preparing a researched case study that describes how to reduce organizational vulnerability by applying ethical decision-making.

Course Content

I. Skills or Competencies – Actions that are essential to achieve the course outcomes: A. Identify classical normative ethical theories

B. Discuss professional codes of conduct

C. Discuss ethics, professionalism, and whistle blowing

D. Discuss anonymity, security, and privacy

E. Discuss intellectual property rights and computer technology

F. Critically appraise ethical issues that arise in informational technology

G. Apply ethical principles to case studies in information technology

II. Themes

– Key recurring concepts that run throughout this course:

A. Ethics and technology

B. Ethics and the workplace

III. Issues

– Key areas of conflict that must be understood in order to achieve the intended outcome:

A. Privacy

B. Intellectual property

C. Computer security and computer crime

IV. Concepts – Key concepts that must be understood to address the issues

A. Traditional ethical theory

B. Professional codes of conduct

C. Social impact of computer technology

Learning Units

I. Historical perspectives on information technology

A. Computing

B. Networking

C. Information storage and retrieval

II. Classic ethical theories

A. Subjective relativism

B. Cultural relativism

C. Divine command theory

D. Kant

IN 275 Information Technology Ethics 2

E. Act utilitarianism

F. Rule utilitarianism

G. Social contract theory

H. Morality of breaking the law

III. Report writing

A. Report structure

B. Source citation

C. Collaborative feedback

D. Revision

IV. Networked communications

A. Email and spam

B. The World Wide Web

C. Ethical perspectives on pornography

D. Censorship

E. Freedom of expression

F. Children and the Web

G. Breaking trust on the Internet

H. Internet addiction

V. Intellectual property

A. Intellectual property rights

B. Protecting intellectual property

C. Fair use

D. New restrictions on use

E. Peer-to-peer networks

F. Protections for software

G. Open-source software

H. Legitimacy of intellectual property protection for software

VI. Privacy

A. Perspectives on privacy

B. Disclosing information

C. Public information

D. US legislation

E. Public records

F. Covert government surveillance

G. US legislation authorizing wiretapping

H. Data mining

I. Identity theft

J. Encryption

VII. Computer and network security

A. Viruses, worms and Trojan horses

B. Phreaks and hackers

IN 275 Information Technology Ethics 3

C. Denial-of-service attacks

D. Online voting

VIII. Computer Reliability

A. Data-entry or data-retrieval errors

B. Software and billing errors

C. Notable software system failure

D. Therac-25

E. Computer simulations

F. Software engineering

G. Software warranties

IX. Professional ethics

A. Are computer experts professionals

B. Software engineering code of ethics

C. Case studies

D. Whistleblowing

X. Work and wealth

A. Automation and unemployment

B. Workplace changes

C. Globalization

D. The digital divide

E.

The “winner-take-all” society

F. Access to public colleges

Learning Activities

Learning activities will be assigned to assist the student to achieve the intended learning outcome(s) through lecture, instructor-led class discussion, instructor-led demos, guest speakers, group activities, drills/skill practice and other activities at the discretion of the instructor.

Grade Determination

The student will be graded on learning activities and assessment tasks. Grade determinants may include the following: daily work, quizzes, chapter or unit tests, comprehensive examinations, projects, presentations, class participation, and other methods of evaluation at the discretion of the instructor.

IN 275 Information Technology Ethics 4

Download