· General Design Analysis - Information is collected from library/internet sources on a design problem that is local, nationwide, or worldwide in scope. A number of journals available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/12976314/View 1/1
Week 8 Assignment Paper D
Instructions
Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning as it applies to
Ethics in Information Technology. It describes your Ah-haor Eureka moments.
It is hoped that this course made you think about the ethical issues that occur
in your personal and work lives and how to go about making ethical choices.
Please use the ideas you learned from this course; how you will synthesize what
you learned from your research about your topic including - over-arching
issues, readings, discussion from class, and conclusions from other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your “take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3 pages, double-
spaced and submit it to your Assignment Folder as an attached Microsoft Word
file. This paper may be subjective in nature!
javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/347/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and of personal and organizational ethical decision making in the use of
information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a
structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often refers to character. The concepts of ethics, character, right and wrong, and
good and evil have captivated humankind ever since we beg.
· General Design Analysis - Information is collected from library.docx
1. · General Design Analysis - Information is collected from
library/internet sources on a design problem that is local,
nationwide, or worldwide in scope. A number of journals
available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although
each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the
problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the
problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics
in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/1297
6314/View 1/1
Week 8 Assignment Paper D
Instructions
2. Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning
as it applies to
Ethics in Information Technology. It describes your Ah-haor
Eureka moments.
It is hoped that this course made you think about the ethical
issues that occur
in your personal and work lives and how to go about making
ethical choices.
Please use the ideas you learned from this course; how you will
synthesize what
you learned from your research about your topic including -
over-arching
issues, readings, discussion from class, and conclusions from
other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your
“take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your
career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3
pages, double-
spaced and submit it to your Assignment Folder as an attached
Microsoft Word
file. This paper may be subjective in nature!
3. javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3
47/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3
47/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and
of personal and organizational ethical decision making in the
use of
information systems in a global environment. The aim is to
identify ethical issues raised by existing and emerging
technologies, apply a
structured framework to analyze risk and decision alternatives,
and understand the impact of personal ethics and organizational
values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often
refers to character. The concepts of ethics, character, right and
wrong, and
good and evil have captivated humankind ever since we began
to live in groups, communicate, and pass judgment on each
others' actions
based on motivation, group rules and norms, and intermediate
and end results. Thinking about ethics can begin with the
individual, and then
expand into group, societal, and cultural ethical considerations.
From this foundation, we can apply (and test against) known
theories and
frameworks to information systems and situations in the modern
4. age. Can ethics and personal character apply, and in the same
ways, in the
modern information- and data-based world in which we
currently live, work, and function? Discovering this application,
and determining the
degree to which it satisfies logic, justice, ethical truths, and
modern reality, is the overarching goal of this course.
While ethics is important for its own sake, we, as information-
systems professionals, have a particular responsibility to
understand and apply
ethics to our professional actions and decisions. Character,
goodness, and just actions are certainly important for everyone,
as they have been
throughout history—and the more power the individual
possesses due to political position or wealth, the greater the
ramifications of character
or the lack of it. However, in no previous age has the
technology for information retrieval, storage, and
communication possessed such
potential to change power structures and be the source of power
itself. In the modern era, information systems managers and
professionals
exercise a new kind of power, with broad and often instant
ramifications. This power—gained through technical
expertise—requires a new
level of social responsibility. This responsibility is satisfied
through a development of understanding of ethics in
Information Technology and
the application of ethics to their own decision-making process.
After reviewing a foundation of ethical thought and becoming
familiar with ethical theories, frameworks, and approaches, you
will be able to
consider several key aspects of modern information systems that
currently challenge information professionals and citizens of
networked and
computing-dependent societies. Through the use of vignettes,
5. you will consider issues affecting ethics for IT workers and IT
users; privacy and
intellectual property; the impact of IT on productivity and
quality of life; and the tradeoffs between laws guiding group
needs and individual
needs. After gaining a basic understanding of ethics, you will
examine privacy/accuracy and property/accessibility, seeing a
broader and more
complex array of modern ethical questions in information
systems and direct challenges facing information systems
professionals today. You
will explore future challenges as you consider how things may
change and what ethical behavior will appear in information
systems as the
twenty-first century unfolds.
The language and facts of information systems and computing
have changed the world, and touched and changed lives. This
industry has
spawned, and continues to spawn, new concepts and new
language, and it does so with extreme rapidity. On the other
hand, ethics, which
was often a study of the ancients, examines unchanging truths.
With many obvious differences in the concepts and
practicalities, a shared aspect of both computing and ethics is
universality. The time-tested
and largely globally shared concepts of basic ethics mirror in
many ways the universal language of programming and
operating systems. The
fun begins as we apply time-tested ethical frameworks to
determine correct actions and decisions in this information
systems world of ones
and zeros; of self-replicating, anonymous, and invisible actors;
and of the global marketplace for information instead of more
concrete and
physical goods and services. The study of ethics in the
Information Technology is fascinating and mentally
6. challenging, and this course should
equip and guide your journey into this ethics and information
maelstrom.
Course Outcomes
After completing this course, you should be able to:
Apply relevant ethical theories, laws, regulations, and policies
to decision making to support organizational compliance.
Apply decision-making framework to analyze risks and decision
alternatives at different levels of an organization.
Identify and address new and/or increased ethical issues raised
by existing and emerging technologies.
Analyze the impact of personal and organizational ethics in
order to foster and support an ethical workforce.
Course Materials
Click to access your course materials information
(http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM%203
04&S=7982&Sem=2188)
Class Guidelines
Contacting your Faculty Member
University of Maryland University College • Adelphi • Syllabus
•
IFSM 304 7982 ETHICS IN INFORMATION TECHNOLOGY
(2188) IFSM-304
Fall 2018 Section 7982 3 Credits 10/22/2018 to 12/16/2018
7. http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM
304&S=7982&Sem=2188
You can use the Pager feature within the classroom to send a
message to your faculty member.
Contacting the Department
If you have questions related to the course content or any of the
graded deliverables, please contact the instructor. For questions
and concerns
related to advising, please write to [email protected]
(mailto:[email protected]) or call (301) 985-7000 or, toll-free
(800) 888-8682.
For other questions and concerns, you can contact your Program
Chair by writing to [email protected] (mailto:[email protected])
or by calling
(240) 684-2840. Please be sure to mention the course name,
course number, and your section number in the "Subject:" field
of your e-mail.
Course Materials
This course uses e-resources posted in the classroom. Assigned
readings and videos, or links to them, may also be posted in the
classroom.
Software Requirements
8. Students have free access to Google software tools through their
UMUC Google mail accounts and Google Drive. Google Drive
is also a good
environment for collaborative document creation. In addition,
there are other free, open software tools that students may use.
Rather than
require students to purchase Microsoft Office applications, they
may use whatever tool they have as long as the document
created can be
read by the faculty member using Microsoft Office. The
responsibility is on the student to ensure the readability of their
products and the
retention of the formatting when they are opened and read in
Microsoft Office.
Additional Information
Effective writing is critical to the intellectual life of university
students and graduates within the workplace. Effective
managers are usually
effective communicators. Your work in this course must
demonstrate your ability to master and effectively communicate
course content.
Effective writing
Meets the needs of the reader
Adequately covers the subject
Uses expected conventions of format and organization
Demonstrates use of credible reasoning and evidence
Satisfies standards of style and grammatical correctness
Requires 100% compliance with UMUC's zero-tolerance policy
regarding plagiarism
This class uses APA style and format for all assignments.
All materials submitted must be original materials developed by
9. the student solely for use in this class and must conform to
UMUC’s academic
policies. Submission of reused materials may result in a
reduced grade or non-acceptance of the assignment at the
faculty member’s
discretion.
For more information about student services and other general
information, visit UMUC’s website at http://www.umuc.edu/
(http://www.umuc.edu/)
Grading Information
This course consists of the following graded items:
Conference participation 16%
Analysis of current events posting on
IT-related ethical global issues
(multinational corporation)
5%
Paper A: apply decision-making
frameworks to IT-related ethical
issues (individual)
15%
Paper B1 (matrix): IT-related ethical
organizational issue applying relevant
laws, regulations, and policies
(individual)
12%
Paper B2: organizational policy to
10. address an ethical IT workforce issue
(individual)
12%
Paper C1: select topic and identify
three critical questions related to the
(individual)
3%
mailto:[email protected]
mailto:[email protected]
http://www.umuc.edu/
Paper C2: – Individual research paper
on existing or emerging technology
and related ethical issue
12%
Paper C3: group presentation:
research on emerging technologies
and issues (group)
15%
Paper D: individual reflection on class
learning (individual)
10%
Total 100%
11. Participation
By registering for a web-based, hybrid, or face-to-face course,
you have made a commitment to participate in your course
conferences as well
as other online and face-to-face activities. Plan to participate
regularly. Participation for this course is defined as proactive
discussion in
weekly conferences, discussion questions, and study group
activities. This requires you to actively reflect on weekly
module and textbook
readings and to develop original ideas in your responses.
Participation for this course is also defined as your proactive
engagement in face-to-
face meetings, if applicable. When participating in a hybrid
course, the online portion requires your participation each week
throughout the
semester, even during weeks when the class meets face to face.
Your online sessions will focus on conference discussions,
study group
activities, and homework assignments. Face-to-face sessions
will be used for instructional lectures, class oral presentations,
and quizzes/tests.
The hybrid classroom allows you to benefit from face-to-face
interaction with the instructor and other students, but also gives
busy UMUC
students the opportunity to work from home for a significant
portion of the course.
You are expected to demonstrate critical thinking and your
understanding of the content in the assigned readings as they
relate to the issues
identified in the conference discussion. You are expected to
make your own contribution in a main topic as well as respond
12. with value-added
comments to at least two of your classmates. You are
encouraged to respond to other students as well as to your
instructor. You will note in
the grading policy that your online conference participation
counts significantly toward your final grade. You are expected
to adhere to the
general rules of online etiquette.
Participation must be completed the week due. Please review
the Grading Rubric for Participation, as shown below:
Responded to discussion topic (by Wednesday midnight) and
two classmates’ postings (by Sunday midnight); postings and
questions posed are relevant to the discussion topic, well
supported with outside research or assigned readings as
appropriate, add value to the discussion, and demonstrate
student’s understanding of concepts.
2.0
(A)
Responded to discussion topic (by Wednesday midnight) and to
two classmates’ postings (by the end of the class week)
postings and questions posed are relevant to the discussion
topic, supported with outside research or assigned readings as
appropriate, add value to the discussion, and demonstrate
student’s understanding of concepts but may lack depth,
completeness, or relevant research
1.6
(B)
Responded to discussion topic (by Wednesday midnight) and
one or two responses to classmates’ postings; postings meet
minimum requirements but lack sufficient depth or supporting
research.
13. 1.4
(C)
Late response to discussion topic, and 1 or 2 responses to
classmates’ postings (by the end of the class week); and/or lack
of sufficient depth, supporting research, demonstration of
understanding of concepts.
1.2
(D)
No participation in the discussion. 0
(F)
Final Examination
There is no final examination for this course, as your grade is
based on a series of assignments that constitute an authentic
assessment
developed into a Learning Portfolio. See Other Information
below.
Late Policy:
Assignments are expected to be submitted on time. Students
have a long lead time in which to prepare, ask questions, and
seek help.
A late assignment will be penalized unless a major accident,
illness, or deployment (for active duty military), with
supporting documentation,
prevents a student from submitting their assignment on time.
Late discussion posts will not be accepted.Unless we have
14. communicated
differently, students have one late week to make up assignments
with a 10% penalty assigned.
Students should keep their instructor informed in advance about
military deployments or other events that may impact their
progress and
participation in the course.
All assignments must be submitted by the end of class, 11:59
PM, EST/EDT. UMUC is on Eastern Standard time and all
activities and
communications will be based on this time zone.
No assignments will be accepted after the last day of class
regardless of the circumstances.
Extra Credit:
Extra credit is not available.
Project Descriptions
Learning Portfolio
Throughout this course you will learn about the impact of
digital technology on ethical behavior in the twenty-first
century. You will complete a
series of assignments that provide an opportunity to
demonstrate your knowledge of course concepts, demonstrate
your ability to analyze
ethical issues, and apply your conclusions to real-world
situations. Collectively, these will comprise your Learning
Portfolio for this course. At
the end of the semester, you will participate in a group that will
prepare a summary PowerPoint presentation as evidence of the
learning and
reflection on readings, discussion, and research. Detailed
instructions and assessment criteria are included in Course
15. Content within the week
descriptions.
.
Assignments:
1) Current Events Article – Identify a current (2016 source or
later) article and summarize its key points, analyze its multi-
national and global
aspects, and determine three critically important questions you
would like to address regarding the article.
2) Paper A: Apply a decision-making framework to an IT-
related ethical issue. This requires a 3-5 page paper addressing
a leading ethical
issue (suggested topics are provided in the Conference Session
One details located in Course Content). You will use a decision-
making
framework from UMUC Module Two to analyze the issue and
select one of the four common approaches to ethical decision
making, from UMUC
Module One.
3) Paper B1 – Privacy-related Matrix. You will analyze a key
IT-related organizational ethical issue and complete a provided
template (see
Course Content) to produce a matrix mapping how this issue is
affected by laws, regulations, and policies.
4) Paper B2- Organizational Policy paper. Write an
organizational or personal policy to correct, modify, or address
the effects of the IT-related
ethical issue that you described in Paper B1.
5) Paper C1 – Topic Selection for a research paper (Paper C2)
on an existing or emerging technology and its related ethical
16. issues. Select a
topic, explain your selection, and determine three critically
important questions that you will address through research for
Paper C2. These
questions will form the thesis for the Paper C2 assignment.
Note: You must receive prior approval from your instructor on
your topic before
proceeding with your research. (This is the first part of a 3-part
assignment.)
6) Paper C2 – Individual research paper on existing or emerging
technology and related ethical issue. (This is the second part of
a 3-part
assignment.)
7) Presentation C3 – Group PowerPoint presentation – groups
will share their individual papers (Papers C1 and C2) and gain
consensus on the
final topic from among the individual team members. A slide
presentation based on the group consensus and collaborative
development will
introduce the topic and rationale for selection; provide research
results on emerging technologies and related issues; provide
summary and
conclusion; and references.
8) Paper D – Reflective paper on class learning. This paper will
include key concepts you learned from this course, especially
how you will
synthesize what you learned from your C2/C3 research, and
discuss how this has impacted your understanding of the ethical
issues, what you
may do differently in the future, how this course may have
influenced your career, and what new challenges might you
anticipate relating to
ethics in IT in the future.
17. Academic Policies
Academic Policies and Guidelines
ACADEMIC INTEGRITY
As a member of the University of Maryland University College
(UMUC) academic community that honors integrity and respect
for others you
are expected to maintain a high level of personal integrity in
your academic work at all times. Your work should be original
and must not be
reused in other courses.
CLASSROOM CIVILITY
Students are expected to work together cooperatively, and treat
fellow students and faculty with respect, showing
professionalism and
courtesy in all interactions. Please review the Code of Civility
for more guidance on interacting in UMUC classrooms:
https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm
(https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm).
POLICIES AND PROCEDURES
UMUC is committed to ensuring that all individuals are treated
equally according to Policy 040.30 Affirmative Action, Equal
Opportunity, and
Sexual Harassment
(https://www.umuc.edu/policies/adminpolicies/admin04030.cfm
18. ).
Students with disabilities who need accommodations in a course
are encouraged to contact the Office of Accessibility Services
(OAS) at
[email protected] (mailto:[email protected]), or call 800-888-
UMUC (8682) or 240-684-2287.
The following academic policies and procedures apply to this
course and your studies at UMUC.
150.25 Academic Dishonesty and Plagiarism
(https://www.umuc.edu/policies/academicpolicies/aa15025.cfm)
– UMUC defines
academic dishonesty as the failure to maintain academic
integrity. All charges of academic dishonesty will be brought
in accordance with this Policy.
Note: In this course, your instructor has access to use
Turnitin.com, a tool that helps to evaluate the originality of
student work. Your instructor may use Turnitin or other
resources to check the authenticity of your work and the
accuracy of your use of sources. To learn more about Turnitin,
the feedback it provides, and your options regarding the
storage of your work in the Turnitin database go to the UMUC
guides at umuc.edu/library/libresources/turnitin-
students.cfm
(https://www.umuc.edu/library/libresources/turnitin.cfm) and
http://sites.umuc.edu/library/libresources/turnitin.cfm#studentco
pyright
(http://sites.umuc.edu/library/libresources/turnitin.cfm). If you
have questions about academic integrity or how to cite
your sources go to the UMUC Academic Integrity Resources
page at http://www.umuc.edu/current-students/learning-
resources/academic-integrity/resources.cfm
(http://www.umuc.edu/current-%20students/learning-
resources/academic-
integrity/resources.cfm).
19. 151.00 Code of Student Conduct
(https://www.umuc.edu/policies/studentpolicies/stud15100.cfm)
170.40
170.41
170.42
The following policies describe the requirements for the award
of each degree:
Degree Completion Requirements for the Graduate School
(https://www.umuc.edu/policies/academicpolicies/aa17040.cfm)
Degree Completion Requirements for a Bachelor’s Degree
(https://www.umuc.edu/policies/academicpolicies/aa17041.cfm)
Degree Completion Requirements for an Associate’s Degree
(https://www.umuc.edu/policies/academicpolicies/aa17042.cfm)
170.71 Policy on Grade of Incomplete
(https://www.umuc.edu/policies/academicpolicies/aa17071.cfm)
- The mark of I is
exceptional and considered only for certain courses. Students
who have completed 60% of their coursework with a
grade of B or better for graduate courses or C or better for
undergraduate courses and request an I before the end of
the term. The mark of I is not available for noncredit courses.
170.72 Course Withdrawal Policy
(https://www.umuc.edu/policies/academicpolicies/aa17072.cfm)
- Students must follow drop
and withdrawal procedures and deadlines available at
https://www.umuc.edu/ (https://www.umuc.edu/) under
Academic
Calendar.
130.80 Procedures for Review of Alleged Arbitrary and
Capricious Grading
(https://www.umuc.edu/policies/academicpolicies/aa13080.cfm)
20. – appeals may be made on final course grades as
described herein.
205.06 Calculation Of Grade-Point Average (GPA) for Inclusion
on Transcripts and Transcript Requests
(https://www.umuc.edu/policies/academicpolicies/aa20506.cfm)
– Note: Undergraduate and Graduate Schools have
different Grading Policies (i.e. The Graduate School does not
award the grade of D). See Course Syllabus for Grading
Policies.
GRADING
According to UMUC’s grading policy, the following marks are
used:
Undergraduate Graduate
https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm
https://www.umuc.edu/policies/adminpolicies/admin04030.cfm
mailto:[email protected]
https://www.umuc.edu/policies/academicpolicies/aa15025.cfm
https://www.umuc.edu/library/libresources/turnitin.cfm
http://sites.umuc.edu/library/libresources/turnitin.cfm
http://www.umuc.edu/current- students/learning-
resources/academic-integrity/resources.cfm
https://www.umuc.edu/policies/studentpolicies/stud15100.cfm
https://www.umuc.edu/policies/academicpolicies/aa17040.cfm
https://www.umuc.edu/policies/academicpolicies/aa17041.cfm
https://www.umuc.edu/policies/academicpolicies/aa17042.cfm
https://www.umuc.edu/policies/academicpolicies/aa17071.cfm
https://www.umuc.edu/policies/academicpolicies/aa17072.cfm
https://www.umuc.edu/
21. https://www.umuc.edu/policies/academicpolicies/aa13080.cfm
https://www.umuc.edu/policies/academicpolicies/aa20506.cfm
A 90-100 90-100
B 80-89 80-89
C 70-79 70-79*
D 60-69 N/A**
F 59 or below 69 or below
FN Failure-Non
attendance
Failure-Non
attendance
G Grade Pending Grade Pending
P Passing Passing
S Satisfactory Satisfactory
U Unsatisfactory Unsatisfactory
I Incomplete Incomplete
AU Audit Audit
W Withdrew Withdrew
* The grade of "B" represents the benchmark for The Graduate
School. Students must maintain a Grade Point Average (GPA)
of 3.0 or higher.
Classes where final grade of C or F places a student on
Academic Probation must be repeated.
** The Graduate School does not award the grade of D.
COURSE EVALUATION SURVEY
UMUC values its students' feedback. You will be asked to
complete an online evaluation toward the end of the term. The
primary purpose of
22. this evaluation process is to assess the effectiveness of
classroom instruction in order to provide the best learning
experience possible and
make continuous improvements to every class. Responses are
kept confidential. Please take full advantage of this opportunity
to provide your
feedback.
LIBRARY SUPPORT
Extensive library resources and services are available online, 24
hours a day, seven days a week at
https://www.umuc.edu/library/index.cfm
(https://www.umuc.edu/library/index.cfm) to support you in
your studies. The UMUC Library provides research assistance
in creating search
strategies, selecting relevant databases, and evaluating and
citing resources in a variety of formats via its Ask a Librarian
service
at https://www.umuc.edu/library/libask/index.cfm
(https://www.umuc.edu/library/libask/index.cfm).
EXTERNAL LINK DISCLAIMER
This course may contain links to external sites neither owned
nor maintained by UMUC. UMUC bears no responsibility for
the accuracy,
legality, or content of external sites or for that of subsequent
links. In addition, the terms of use, security policies, and
privacy policies may
differ from those of UMUC. Contact the external site for
answers to questions regarding its content, terms of use, and
policies.
LEARNING MANAGEMENT SYSTEM SUPPORT
To successfully navigate the online classroom new students are
encouraged to view the Classroom Walkthrough under Help in
the upper right
23. menu of the LEO classroom. Those requiring technical
assistance can access [email protected] Support directly in LEO
under the Help menu.
Additional technical support is available 24 hours a day, seven
days a week via self-help and live chat at
https://www.umuc.edu/help
(https://www.umuc.edu/help) or by phone toll-free at 888-360-
UMUC (8682).
SYLLABUS CHANGES
All items on this syllabus are subject to change at the discretion
of the Instructor and the Office of Academic Affairs.
Class & Assignment Schedule
Students can access their complete list of assignments and their
corresponding due dates within the Assignments section of the
classroom by
navigating to the Assignments section of the class from the
main navigation bar. Click the link below, and then click
Assignments, for a video
demonstration on how to utilize the assignment list feature.
Classroom Walkthrough
(http://www.umuc.edu/students/leo/videos.cfm)
Students also have access to a calendar tool on the course
homepage within the classroom.
Week Topics Readings/Assignments -
All assignments must be posted to the Assignments Folder in
LEO by 11:59 p.m. U.S. East Coast time on
the date due. (Links to reading material also available in the
Course Content section)
https://www.umuc.edu/library/index.cfm
24. https://www.umuc.edu/library/libask/index.cfm
https://www.umuc.edu/help
http://www.umuc.edu/students/leo/videos.cfm
Week
1
Introduction
to Ethics
Read:
Module 1: Introduction to Ethical Theories
Boundless by Lumen Learning
(https://courses.lumenlearning.com/boundless-management/):
Go to Ethics in
Business, select Ethics, an Overview, read Defining Ethics;
Ethics Training; The Manager’s Role in Ethical
Conduct; Blurring Ethical Lines; and Business Ethics Around
the Globe, then select Corporate Social
Responsibility.
Assignment:
Submit to LEO Assignments: Paper CE involving a Current
Events article on an IT-related Ethical Global issue
(multi-national corporation)
Discussion Topic One (DT-1)
Start Paper A: application of decision-making frameworks to
IT-related ethical issues
Week
25. 2
Ethical
Decision-
Making
Read:
Module 2: Methods of Ethical Analysis
Boundless by Lumen Learning
(https://courses.lumenlearning.com/boundless-management/):
Go to Ethics in
Business, select Maintaining Ethical Standards, read Ethical
Decision Making; Training Ethical Decision
Making; Managers Role in Ethical Conduct; and Codes of
Conduct
Assignments:
Submit to LEO Assignments: Paper A –application of decision
making frameworks to an IT-related ethical issue
Discussion Topic Two (DT-2)
Start Paper B1 - Matrix: IT-related ethical organizational issue
applying selected principles
Week
3
Ethical
Issues:
Computer
and Internet
Crime,
Security, and
26. Privacy.
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility -
Read Commentary: Introduction, Privacy Issues in Information
Systems and Accuracy and Accountability Issues in
Information Systems
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Computer
and Internet Crime
Legal and Regulatory Issues in the Information Economy
(https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in
_the_Information_Economy): Consumer Privacy and
Protection, Cybercrimes
Assignments:
Submit to LEO Assignments: Paper B1 - Matrix: IT-related
ethical organizational issue applying selected principles
Discussion Topic Three (DT-3)
Start Paper B2- an Organizational Policy to address an IT-
related ethical issue.
Week
4
Ethical
Issues:
Freedom of
Expression,
Intellectual
Property, and
27. Plagiarism
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility -
Read Intellectual Property Issues in Information Systems,
Property Rights and Law, and Plagiarism
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Intellectual
Property
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Freedom of
Expression
Read in entirety: Freedom of speech in the United States
(https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite
d_States)
Legal and Regulatory Issues in the Information Economy
(https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in
_the_Information_Economy): Ideas Trade Secrets and
Intellectual Property
Read in entirety: Copyright For The Rest Of Us
(http://cnx.org/content/col11385/latest/)
Read in entirety: The Scope of Copyright Law
(http://cnx.org/content/m22659/latest/)
Read in entirety: The academic plagiarism and its punishments -
a review (http://www.scielo.br/scielo.php?
script=sci_arttext&pid=S0102-695X2011000300003)
Assignments:
Submit to LEO Assignments: Paper B2- an Organizational
Policy to address an IT-related ethical issue.
Discussion Topic Four (DT-4)
Start Paper C1: Topic Selection for individual research on an
28. existing or emerging technology and its related
ethical issues
https://courses.lumenlearning.com/boundless-management/
https://courses.lumenlearning.com/boundless-management/
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_
the_Information_Economy
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite
d_States
https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_
the_Information_Economy
http://cnx.org/content/col11385/latest/
http://cnx.org/content/m22659/latest/
http://www.scielo.br/scielo.php?script=sci_arttext&pid=S0102-
695X2011000300003
Week
5
Ethical
Issues:
Software
Development
29. (i.e.,
Software
Product
Liability,
Safety
Critical
Systems, and
Software
Quality),
Quality of Life
(i.e.,
Accessibility
– Digital
Divide), and
Risk Analysis
and
Management
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility . Read
Access in Information Systems
Module 4: IT Professionals, Information Systems, and Ethical
Issues Today . Read System Quality, Quality
of Life, Equity, Access, and Boundaries
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Software
Quality,
Nets, Webs, and the Information Infrastructure
(https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Informatio
n_Infrastructure): Net for us (Digital Divide).
Internet Governance (Digital Divide)
(https://en.wikibooks.org/wiki/Internet_Governance)
Risk management
30. (https://en.wikipedia.org/wiki/Risk_management) Risk
management, Introduction, and
Limitations
Risk (https://en.wikipedia.org/wiki/Risk) Information
technology and information security
Business Fundamentals by Donald J McCubbrey 2009
(https://www.saylor.org/site/wp-
content/uploads/2014/01/BUS501-2.1-BusinessFundamentals-
CCBY.pdf): Chapter 10 - What is IS Risk
Management?
Assignments:
Submit to LEO Assignments: Paper C1: Topic Selection –
Ethical Issue in Technology
Discussion Topic Five (DT-5)
Start work on Paper C2: Individual research paper on existing
or emerging technology and its related ethical
issues
Start working with your Group in preparation for Presentation
C3 - Group PowerPoint Presentation of research on
existing or emerging technology and its related ethical issues.
Post a synopsis of your topic selection (C1) to your
Group in the Group Collaboration for Presentation C3
Discussion Forum for further collaboration in preparation for
a group presentation
Week
6
Ethical
Issues: IT
Professionals
and Ethics of
IT
Organizations
31. Read:
Module 4: IT Professionals, Information Systems, and Ethical
Issues Today - Read Commentary -
Introduction, Legal Concerns, Economic Concerns, and
Governmental Concerns.
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Ethics for IT
Professionals
Ethics for IT Professionals/What Is Ethics
(https://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/Wh
at_Is_Ethics)
Assignments:
Submit to LEO Assignments: Paper C2 – individual research on
an existing or emerging technology and its related
ethical issues.
Discussion Topic Six (DT-6)
Continue work on Presentation C3 –Group PowerPoint
Presentation – research on existing or emerging technology
and its related ethical issues Post a copy of your Paper C2 as an
attachment to your Group in the Group
Collaboration for Presentation C3 Discussion Forum so others
can read further detail to develop more information
in addition to the topic selection you previously provided.
Week
7
Ethical Issue:
Social
Networking
Read:
32. Effects of Social media on Kids in the Future
(https://www.youthvoices.live/2017/09/25/effects-of-social-
media-on-
kids-in-the-future/)
Living in a Connected World/Persistent Connectivity and the
Fear of Missing Out (i.e., Social Media
(https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P
ersistent_Connectivity_and_the_Fear_of_Missing_Out))
Living in a Connected World/Privacy in a Digital Age
(https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P
rivacy_in_a_Digital_Age)
Information Technology and Ethics/Social Networking and
Business
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics/Social_Networking_and_Business) Go to
Contents - Read Disadvantages and advantages of Social
Networking and Benefits of Social Networking.
Information Technology and Ethics: Social Networking and
Business; Cyber-Crimes II (Cyber-Bullying)
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics/Cyber-Crimes_II)
Assignments:
Group Leaders submit Presentation C3 by Group to LEO
Assignments.
Discussion Topic (DT-7)
Group Leader post Presentation C3 in the Group Topic of the
Discussion Topic Eight Forum provided.
Start individual reflective Paper D on class learning
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Information
_Infrastructure
34. (http://scipol.duke.edu/content/preparing-future-artificial-
intelligence) - Read Executive Summary and Introduction
Where Is the Smartphone Leading the Health of Children?
(https://www.intechopen.com/books/smartphones-from-
an-applied-research-perspective/where-is-the-smartphone-
leading-the-health-of-children-) - Read in entirety
Read entire original paper: Piracy is definitely illegal
(http://www.open.edu/openlearn/society/the-law/law/piracy-
definitely-illegal)
Assignments:
Submit to LEO Assignments: Paper D - Reflective paper on
class learning
Discussion Topic (DT-8)
http://scipol.duke.edu/content/preparing-future-artificial-
intelligence
https://www.intechopen.com/books/smartphones-from-an-
applied-research-perspective/where-is-the-smartphone-leading-
the-health-of-children-
http://www.open.edu/openlearn/society/the-law/law/piracy-
definitely-illegalIFSM 304 7982 Ethics in Information
Technology (2188) IFSM-304Faculty ContactCourse
DescriptionCourse IntroductionCourse OutcomesCourse
MaterialsClass GuidelinesGrading InformationProject
DescriptionsAcademic PoliciesClass & Assignment Schedule