SlideShare a Scribd company logo
1 of 34
· General Design Analysis - Information is collected from
library/internet sources on a design problem that is local,
nationwide, or worldwide in scope. A number of journals
available online are an excellent place to start
The effect of alternate fuels on vehicle performance
· It is important for your paper to be well structured. Although
each paper will be different, most papers should have:
· A. Problem Statement, including the significance of the
problem and who is likely to be interested in the solution.
· B. Evaluation of the important factors involved in solving the
problem.
· C. Presentation of one or more proposed solutions.
· D. Conclusions
12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics
in Information Technology (2188)
https://learn.umuc.edu/d2l/le/content/329020/viewContent/1297
6314/View 1/1
Week 8 Assignment Paper D
Instructions
Paper D: Reflective paper on class learning.
Consider this assignment as a reflective piece on class learning
as it applies to
Ethics in Information Technology. It describes your Ah-haor
Eureka moments.
It is hoped that this course made you think about the ethical
issues that occur
in your personal and work lives and how to go about making
ethical choices.
Please use the ideas you learned from this course; how you will
synthesize what
you learned from your research about your topic including -
over-arching
issues, readings, discussion from class, and conclusions from
other
assignments that apply to your research.
Please address the following elements:
From a class learning perspective, what were some of your
“take-aways?”
How has this impacted your understanding of the ethical issues?
What will you do differently?
How has what you have learned in this course influenced your
career?
As we continue to move toward a global community, what new
challenges might we see relating to ethics in IT?
You are to prepare a reflective piece of not more than 2-3
pages, double-
spaced and submit it to your Assignment Folder as an attached
Microsoft Word
file. This paper may be subjective in nature!
javascript:void(0);
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3
47/Previous?pId=12976197
https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3
47/Next?pId=12976197
Faculty Contact
Linda Beach [email protected]
Course Description
Recommended: IFSM 201. A comprehensive study of ethics and
of personal and organizational ethical decision making in the
use of
information systems in a global environment. The aim is to
identify ethical issues raised by existing and emerging
technologies, apply a
structured framework to analyze risk and decision alternatives,
and understand the impact of personal ethics and organizational
values on an
ethical workplace.
Course Introduction
The word ethics has its root in the word ethos, which most often
refers to character. The concepts of ethics, character, right and
wrong, and
good and evil have captivated humankind ever since we began
to live in groups, communicate, and pass judgment on each
others' actions
based on motivation, group rules and norms, and intermediate
and end results. Thinking about ethics can begin with the
individual, and then
expand into group, societal, and cultural ethical considerations.
From this foundation, we can apply (and test against) known
theories and
frameworks to information systems and situations in the modern
age. Can ethics and personal character apply, and in the same
ways, in the
modern information- and data-based world in which we
currently live, work, and function? Discovering this application,
and determining the
degree to which it satisfies logic, justice, ethical truths, and
modern reality, is the overarching goal of this course.
While ethics is important for its own sake, we, as information-
systems professionals, have a particular responsibility to
understand and apply
ethics to our professional actions and decisions. Character,
goodness, and just actions are certainly important for everyone,
as they have been
throughout history—and the more power the individual
possesses due to political position or wealth, the greater the
ramifications of character
or the lack of it. However, in no previous age has the
technology for information retrieval, storage, and
communication possessed such
potential to change power structures and be the source of power
itself. In the modern era, information systems managers and
professionals
exercise a new kind of power, with broad and often instant
ramifications. This power—gained through technical
expertise—requires a new
level of social responsibility. This responsibility is satisfied
through a development of understanding of ethics in
Information Technology and
the application of ethics to their own decision-making process.
After reviewing a foundation of ethical thought and becoming
familiar with ethical theories, frameworks, and approaches, you
will be able to
consider several key aspects of modern information systems that
currently challenge information professionals and citizens of
networked and
computing-dependent societies. Through the use of vignettes,
you will consider issues affecting ethics for IT workers and IT
users; privacy and
intellectual property; the impact of IT on productivity and
quality of life; and the tradeoffs between laws guiding group
needs and individual
needs. After gaining a basic understanding of ethics, you will
examine privacy/accuracy and property/accessibility, seeing a
broader and more
complex array of modern ethical questions in information
systems and direct challenges facing information systems
professionals today. You
will explore future challenges as you consider how things may
change and what ethical behavior will appear in information
systems as the
twenty-first century unfolds.
The language and facts of information systems and computing
have changed the world, and touched and changed lives. This
industry has
spawned, and continues to spawn, new concepts and new
language, and it does so with extreme rapidity. On the other
hand, ethics, which
was often a study of the ancients, examines unchanging truths.
With many obvious differences in the concepts and
practicalities, a shared aspect of both computing and ethics is
universality. The time-tested
and largely globally shared concepts of basic ethics mirror in
many ways the universal language of programming and
operating systems. The
fun begins as we apply time-tested ethical frameworks to
determine correct actions and decisions in this information
systems world of ones
and zeros; of self-replicating, anonymous, and invisible actors;
and of the global marketplace for information instead of more
concrete and
physical goods and services. The study of ethics in the
Information Technology is fascinating and mentally
challenging, and this course should
equip and guide your journey into this ethics and information
maelstrom.
Course Outcomes
After completing this course, you should be able to:
Apply relevant ethical theories, laws, regulations, and policies
to decision making to support organizational compliance.
Apply decision-making framework to analyze risks and decision
alternatives at different levels of an organization.
Identify and address new and/or increased ethical issues raised
by existing and emerging technologies.
Analyze the impact of personal and organizational ethics in
order to foster and support an ethical workforce.
Course Materials
Click to access your course materials information
(http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM%203
04&S=7982&Sem=2188)
Class Guidelines
Contacting your Faculty Member
University of Maryland University College • Adelphi • Syllabus
•
IFSM 304 7982 ETHICS IN INFORMATION TECHNOLOGY
(2188) IFSM-304
Fall 2018 Section 7982 3 Credits 10/22/2018 to 12/16/2018
http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM
304&S=7982&Sem=2188
You can use the Pager feature within the classroom to send a
message to your faculty member.
Contacting the Department
If you have questions related to the course content or any of the
graded deliverables, please contact the instructor. For questions
and concerns
related to advising, please write to [email protected]
(mailto:[email protected]) or call (301) 985-7000 or, toll-free
(800) 888-8682.
For other questions and concerns, you can contact your Program
Chair by writing to [email protected] (mailto:[email protected])
or by calling
(240) 684-2840. Please be sure to mention the course name,
course number, and your section number in the "Subject:" field
of your e-mail.
Course Materials
This course uses e-resources posted in the classroom. Assigned
readings and videos, or links to them, may also be posted in the
classroom.
Software Requirements
Students have free access to Google software tools through their
UMUC Google mail accounts and Google Drive. Google Drive
is also a good
environment for collaborative document creation. In addition,
there are other free, open software tools that students may use.
Rather than
require students to purchase Microsoft Office applications, they
may use whatever tool they have as long as the document
created can be
read by the faculty member using Microsoft Office. The
responsibility is on the student to ensure the readability of their
products and the
retention of the formatting when they are opened and read in
Microsoft Office.
Additional Information
Effective writing is critical to the intellectual life of university
students and graduates within the workplace. Effective
managers are usually
effective communicators. Your work in this course must
demonstrate your ability to master and effectively communicate
course content.
Effective writing
Meets the needs of the reader
Adequately covers the subject
Uses expected conventions of format and organization
Demonstrates use of credible reasoning and evidence
Satisfies standards of style and grammatical correctness
Requires 100% compliance with UMUC's zero-tolerance policy
regarding plagiarism
This class uses APA style and format for all assignments.
All materials submitted must be original materials developed by
the student solely for use in this class and must conform to
UMUC’s academic
policies. Submission of reused materials may result in a
reduced grade or non-acceptance of the assignment at the
faculty member’s
discretion.
For more information about student services and other general
information, visit UMUC’s website at http://www.umuc.edu/
(http://www.umuc.edu/)
Grading Information
This course consists of the following graded items:
Conference participation 16%
Analysis of current events posting on
IT-related ethical global issues
(multinational corporation)
5%
Paper A: apply decision-making
frameworks to IT-related ethical
issues (individual)
15%
Paper B1 (matrix): IT-related ethical
organizational issue applying relevant
laws, regulations, and policies
(individual)
12%
Paper B2: organizational policy to
address an ethical IT workforce issue
(individual)
12%
Paper C1: select topic and identify
three critical questions related to the
(individual)
3%
mailto:[email protected]
mailto:[email protected]
http://www.umuc.edu/
Paper C2: – Individual research paper
on existing or emerging technology
and related ethical issue
12%
Paper C3: group presentation:
research on emerging technologies
and issues (group)
15%
Paper D: individual reflection on class
learning (individual)
10%
Total 100%
Participation
By registering for a web-based, hybrid, or face-to-face course,
you have made a commitment to participate in your course
conferences as well
as other online and face-to-face activities. Plan to participate
regularly. Participation for this course is defined as proactive
discussion in
weekly conferences, discussion questions, and study group
activities. This requires you to actively reflect on weekly
module and textbook
readings and to develop original ideas in your responses.
Participation for this course is also defined as your proactive
engagement in face-to-
face meetings, if applicable. When participating in a hybrid
course, the online portion requires your participation each week
throughout the
semester, even during weeks when the class meets face to face.
Your online sessions will focus on conference discussions,
study group
activities, and homework assignments. Face-to-face sessions
will be used for instructional lectures, class oral presentations,
and quizzes/tests.
The hybrid classroom allows you to benefit from face-to-face
interaction with the instructor and other students, but also gives
busy UMUC
students the opportunity to work from home for a significant
portion of the course.
You are expected to demonstrate critical thinking and your
understanding of the content in the assigned readings as they
relate to the issues
identified in the conference discussion. You are expected to
make your own contribution in a main topic as well as respond
with value-added
comments to at least two of your classmates. You are
encouraged to respond to other students as well as to your
instructor. You will note in
the grading policy that your online conference participation
counts significantly toward your final grade. You are expected
to adhere to the
general rules of online etiquette.
Participation must be completed the week due. Please review
the Grading Rubric for Participation, as shown below:
Responded to discussion topic (by Wednesday midnight) and
two classmates’ postings (by Sunday midnight); postings and
questions posed are relevant to the discussion topic, well
supported with outside research or assigned readings as
appropriate, add value to the discussion, and demonstrate
student’s understanding of concepts.
2.0
(A)
Responded to discussion topic (by Wednesday midnight) and to
two classmates’ postings (by the end of the class week)
postings and questions posed are relevant to the discussion
topic, supported with outside research or assigned readings as
appropriate, add value to the discussion, and demonstrate
student’s understanding of concepts but may lack depth,
completeness, or relevant research
1.6
(B)
Responded to discussion topic (by Wednesday midnight) and
one or two responses to classmates’ postings; postings meet
minimum requirements but lack sufficient depth or supporting
research.
1.4
(C)
Late response to discussion topic, and 1 or 2 responses to
classmates’ postings (by the end of the class week); and/or lack
of sufficient depth, supporting research, demonstration of
understanding of concepts.
1.2
(D)
No participation in the discussion. 0
(F)
Final Examination
There is no final examination for this course, as your grade is
based on a series of assignments that constitute an authentic
assessment
developed into a Learning Portfolio. See Other Information
below.
Late Policy:
Assignments are expected to be submitted on time. Students
have a long lead time in which to prepare, ask questions, and
seek help.
A late assignment will be penalized unless a major accident,
illness, or deployment (for active duty military), with
supporting documentation,
prevents a student from submitting their assignment on time.
Late discussion posts will not be accepted.Unless we have
communicated
differently, students have one late week to make up assignments
with a 10% penalty assigned.
Students should keep their instructor informed in advance about
military deployments or other events that may impact their
progress and
participation in the course.
All assignments must be submitted by the end of class, 11:59
PM, EST/EDT. UMUC is on Eastern Standard time and all
activities and
communications will be based on this time zone.
No assignments will be accepted after the last day of class
regardless of the circumstances.
Extra Credit:
Extra credit is not available.
Project Descriptions
Learning Portfolio
Throughout this course you will learn about the impact of
digital technology on ethical behavior in the twenty-first
century. You will complete a
series of assignments that provide an opportunity to
demonstrate your knowledge of course concepts, demonstrate
your ability to analyze
ethical issues, and apply your conclusions to real-world
situations. Collectively, these will comprise your Learning
Portfolio for this course. At
the end of the semester, you will participate in a group that will
prepare a summary PowerPoint presentation as evidence of the
learning and
reflection on readings, discussion, and research. Detailed
instructions and assessment criteria are included in Course
Content within the week
descriptions.
.
Assignments:
1) Current Events Article – Identify a current (2016 source or
later) article and summarize its key points, analyze its multi-
national and global
aspects, and determine three critically important questions you
would like to address regarding the article.
2) Paper A: Apply a decision-making framework to an IT-
related ethical issue. This requires a 3-5 page paper addressing
a leading ethical
issue (suggested topics are provided in the Conference Session
One details located in Course Content). You will use a decision-
making
framework from UMUC Module Two to analyze the issue and
select one of the four common approaches to ethical decision
making, from UMUC
Module One.
3) Paper B1 – Privacy-related Matrix. You will analyze a key
IT-related organizational ethical issue and complete a provided
template (see
Course Content) to produce a matrix mapping how this issue is
affected by laws, regulations, and policies.
4) Paper B2- Organizational Policy paper. Write an
organizational or personal policy to correct, modify, or address
the effects of the IT-related
ethical issue that you described in Paper B1.
5) Paper C1 – Topic Selection for a research paper (Paper C2)
on an existing or emerging technology and its related ethical
issues. Select a
topic, explain your selection, and determine three critically
important questions that you will address through research for
Paper C2. These
questions will form the thesis for the Paper C2 assignment.
Note: You must receive prior approval from your instructor on
your topic before
proceeding with your research. (This is the first part of a 3-part
assignment.)
6) Paper C2 – Individual research paper on existing or emerging
technology and related ethical issue. (This is the second part of
a 3-part
assignment.)
7) Presentation C3 – Group PowerPoint presentation – groups
will share their individual papers (Papers C1 and C2) and gain
consensus on the
final topic from among the individual team members. A slide
presentation based on the group consensus and collaborative
development will
introduce the topic and rationale for selection; provide research
results on emerging technologies and related issues; provide
summary and
conclusion; and references.
8) Paper D – Reflective paper on class learning. This paper will
include key concepts you learned from this course, especially
how you will
synthesize what you learned from your C2/C3 research, and
discuss how this has impacted your understanding of the ethical
issues, what you
may do differently in the future, how this course may have
influenced your career, and what new challenges might you
anticipate relating to
ethics in IT in the future.
Academic Policies
Academic Policies and Guidelines
ACADEMIC INTEGRITY
As a member of the University of Maryland University College
(UMUC) academic community that honors integrity and respect
for others you
are expected to maintain a high level of personal integrity in
your academic work at all times. Your work should be original
and must not be
reused in other courses.
CLASSROOM CIVILITY
Students are expected to work together cooperatively, and treat
fellow students and faculty with respect, showing
professionalism and
courtesy in all interactions. Please review the Code of Civility
for more guidance on interacting in UMUC classrooms:
https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm
(https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm).
POLICIES AND PROCEDURES
UMUC is committed to ensuring that all individuals are treated
equally according to Policy 040.30 Affirmative Action, Equal
Opportunity, and
Sexual Harassment
(https://www.umuc.edu/policies/adminpolicies/admin04030.cfm
).
Students with disabilities who need accommodations in a course
are encouraged to contact the Office of Accessibility Services
(OAS) at
[email protected] (mailto:[email protected]), or call 800-888-
UMUC (8682) or 240-684-2287.
The following academic policies and procedures apply to this
course and your studies at UMUC.
150.25 Academic Dishonesty and Plagiarism
(https://www.umuc.edu/policies/academicpolicies/aa15025.cfm)
– UMUC defines
academic dishonesty as the failure to maintain academic
integrity. All charges of academic dishonesty will be brought
in accordance with this Policy.
Note: In this course, your instructor has access to use
Turnitin.com, a tool that helps to evaluate the originality of
student work. Your instructor may use Turnitin or other
resources to check the authenticity of your work and the
accuracy of your use of sources. To learn more about Turnitin,
the feedback it provides, and your options regarding the
storage of your work in the Turnitin database go to the UMUC
guides at umuc.edu/library/libresources/turnitin-
students.cfm
(https://www.umuc.edu/library/libresources/turnitin.cfm) and
http://sites.umuc.edu/library/libresources/turnitin.cfm#studentco
pyright
(http://sites.umuc.edu/library/libresources/turnitin.cfm). If you
have questions about academic integrity or how to cite
your sources go to the UMUC Academic Integrity Resources
page at http://www.umuc.edu/current-students/learning-
resources/academic-integrity/resources.cfm
(http://www.umuc.edu/current-%20students/learning-
resources/academic-
integrity/resources.cfm).
151.00 Code of Student Conduct
(https://www.umuc.edu/policies/studentpolicies/stud15100.cfm)
170.40
170.41
170.42
The following policies describe the requirements for the award
of each degree:
Degree Completion Requirements for the Graduate School
(https://www.umuc.edu/policies/academicpolicies/aa17040.cfm)
Degree Completion Requirements for a Bachelor’s Degree
(https://www.umuc.edu/policies/academicpolicies/aa17041.cfm)
Degree Completion Requirements for an Associate’s Degree
(https://www.umuc.edu/policies/academicpolicies/aa17042.cfm)
170.71 Policy on Grade of Incomplete
(https://www.umuc.edu/policies/academicpolicies/aa17071.cfm)
- The mark of I is
exceptional and considered only for certain courses. Students
who have completed 60% of their coursework with a
grade of B or better for graduate courses or C or better for
undergraduate courses and request an I before the end of
the term. The mark of I is not available for noncredit courses.
170.72 Course Withdrawal Policy
(https://www.umuc.edu/policies/academicpolicies/aa17072.cfm)
- Students must follow drop
and withdrawal procedures and deadlines available at
https://www.umuc.edu/ (https://www.umuc.edu/) under
Academic
Calendar.
130.80 Procedures for Review of Alleged Arbitrary and
Capricious Grading
(https://www.umuc.edu/policies/academicpolicies/aa13080.cfm)
– appeals may be made on final course grades as
described herein.
205.06 Calculation Of Grade-Point Average (GPA) for Inclusion
on Transcripts and Transcript Requests
(https://www.umuc.edu/policies/academicpolicies/aa20506.cfm)
– Note: Undergraduate and Graduate Schools have
different Grading Policies (i.e. The Graduate School does not
award the grade of D). See Course Syllabus for Grading
Policies.
GRADING
According to UMUC’s grading policy, the following marks are
used:
Undergraduate Graduate
https://www.umuc.edu/students/support/studentlife/conduct/cod
e.cfm
https://www.umuc.edu/policies/adminpolicies/admin04030.cfm
mailto:[email protected]
https://www.umuc.edu/policies/academicpolicies/aa15025.cfm
https://www.umuc.edu/library/libresources/turnitin.cfm
http://sites.umuc.edu/library/libresources/turnitin.cfm
http://www.umuc.edu/current- students/learning-
resources/academic-integrity/resources.cfm
https://www.umuc.edu/policies/studentpolicies/stud15100.cfm
https://www.umuc.edu/policies/academicpolicies/aa17040.cfm
https://www.umuc.edu/policies/academicpolicies/aa17041.cfm
https://www.umuc.edu/policies/academicpolicies/aa17042.cfm
https://www.umuc.edu/policies/academicpolicies/aa17071.cfm
https://www.umuc.edu/policies/academicpolicies/aa17072.cfm
https://www.umuc.edu/
https://www.umuc.edu/policies/academicpolicies/aa13080.cfm
https://www.umuc.edu/policies/academicpolicies/aa20506.cfm
A 90-100 90-100
B 80-89 80-89
C 70-79 70-79*
D 60-69 N/A**
F 59 or below 69 or below
FN Failure-Non
attendance
Failure-Non
attendance
G Grade Pending Grade Pending
P Passing Passing
S Satisfactory Satisfactory
U Unsatisfactory Unsatisfactory
I Incomplete Incomplete
AU Audit Audit
W Withdrew Withdrew
* The grade of "B" represents the benchmark for The Graduate
School. Students must maintain a Grade Point Average (GPA)
of 3.0 or higher.
Classes where final grade of C or F places a student on
Academic Probation must be repeated.
** The Graduate School does not award the grade of D.
COURSE EVALUATION SURVEY
UMUC values its students' feedback. You will be asked to
complete an online evaluation toward the end of the term. The
primary purpose of
this evaluation process is to assess the effectiveness of
classroom instruction in order to provide the best learning
experience possible and
make continuous improvements to every class. Responses are
kept confidential. Please take full advantage of this opportunity
to provide your
feedback.
LIBRARY SUPPORT
Extensive library resources and services are available online, 24
hours a day, seven days a week at
https://www.umuc.edu/library/index.cfm
(https://www.umuc.edu/library/index.cfm) to support you in
your studies. The UMUC Library provides research assistance
in creating search
strategies, selecting relevant databases, and evaluating and
citing resources in a variety of formats via its Ask a Librarian
service
at https://www.umuc.edu/library/libask/index.cfm
(https://www.umuc.edu/library/libask/index.cfm).
EXTERNAL LINK DISCLAIMER
This course may contain links to external sites neither owned
nor maintained by UMUC. UMUC bears no responsibility for
the accuracy,
legality, or content of external sites or for that of subsequent
links. In addition, the terms of use, security policies, and
privacy policies may
differ from those of UMUC. Contact the external site for
answers to questions regarding its content, terms of use, and
policies.
LEARNING MANAGEMENT SYSTEM SUPPORT
To successfully navigate the online classroom new students are
encouraged to view the Classroom Walkthrough under Help in
the upper right
menu of the LEO classroom. Those requiring technical
assistance can access [email protected] Support directly in LEO
under the Help menu.
Additional technical support is available 24 hours a day, seven
days a week via self-help and live chat at
https://www.umuc.edu/help
(https://www.umuc.edu/help) or by phone toll-free at 888-360-
UMUC (8682).
SYLLABUS CHANGES
All items on this syllabus are subject to change at the discretion
of the Instructor and the Office of Academic Affairs.
Class & Assignment Schedule
Students can access their complete list of assignments and their
corresponding due dates within the Assignments section of the
classroom by
navigating to the Assignments section of the class from the
main navigation bar. Click the link below, and then click
Assignments, for a video
demonstration on how to utilize the assignment list feature.
Classroom Walkthrough
(http://www.umuc.edu/students/leo/videos.cfm)
Students also have access to a calendar tool on the course
homepage within the classroom.
Week Topics Readings/Assignments -
All assignments must be posted to the Assignments Folder in
LEO by 11:59 p.m. U.S. East Coast time on
the date due. (Links to reading material also available in the
Course Content section)
https://www.umuc.edu/library/index.cfm
https://www.umuc.edu/library/libask/index.cfm
https://www.umuc.edu/help
http://www.umuc.edu/students/leo/videos.cfm
Week
1
Introduction
to Ethics
Read:
Module 1: Introduction to Ethical Theories
Boundless by Lumen Learning
(https://courses.lumenlearning.com/boundless-management/):
Go to Ethics in
Business, select Ethics, an Overview, read Defining Ethics;
Ethics Training; The Manager’s Role in Ethical
Conduct; Blurring Ethical Lines; and Business Ethics Around
the Globe, then select Corporate Social
Responsibility.
Assignment:
Submit to LEO Assignments: Paper CE involving a Current
Events article on an IT-related Ethical Global issue
(multi-national corporation)
Discussion Topic One (DT-1)
Start Paper A: application of decision-making frameworks to
IT-related ethical issues
Week
2
Ethical
Decision-
Making
Read:
Module 2: Methods of Ethical Analysis
Boundless by Lumen Learning
(https://courses.lumenlearning.com/boundless-management/):
Go to Ethics in
Business, select Maintaining Ethical Standards, read Ethical
Decision Making; Training Ethical Decision
Making; Managers Role in Ethical Conduct; and Codes of
Conduct
Assignments:
Submit to LEO Assignments: Paper A –application of decision
making frameworks to an IT-related ethical issue
Discussion Topic Two (DT-2)
Start Paper B1 - Matrix: IT-related ethical organizational issue
applying selected principles
Week
3
Ethical
Issues:
Computer
and Internet
Crime,
Security, and
Privacy.
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility -
Read Commentary: Introduction, Privacy Issues in Information
Systems and Accuracy and Accountability Issues in
Information Systems
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Computer
and Internet Crime
Legal and Regulatory Issues in the Information Economy
(https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in
_the_Information_Economy): Consumer Privacy and
Protection, Cybercrimes
Assignments:
Submit to LEO Assignments: Paper B1 - Matrix: IT-related
ethical organizational issue applying selected principles
Discussion Topic Three (DT-3)
Start Paper B2- an Organizational Policy to address an IT-
related ethical issue.
Week
4
Ethical
Issues:
Freedom of
Expression,
Intellectual
Property, and
Plagiarism
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility -
Read Intellectual Property Issues in Information Systems,
Property Rights and Law, and Plagiarism
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Intellectual
Property
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Freedom of
Expression
Read in entirety: Freedom of speech in the United States
(https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite
d_States)
Legal and Regulatory Issues in the Information Economy
(https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in
_the_Information_Economy): Ideas Trade Secrets and
Intellectual Property
Read in entirety: Copyright For The Rest Of Us
(http://cnx.org/content/col11385/latest/)
Read in entirety: The Scope of Copyright Law
(http://cnx.org/content/m22659/latest/)
Read in entirety: The academic plagiarism and its punishments -
a review (http://www.scielo.br/scielo.php?
script=sci_arttext&pid=S0102-695X2011000300003)
Assignments:
Submit to LEO Assignments: Paper B2- an Organizational
Policy to address an IT-related ethical issue.
Discussion Topic Four (DT-4)
Start Paper C1: Topic Selection for individual research on an
existing or emerging technology and its related
ethical issues
https://courses.lumenlearning.com/boundless-management/
https://courses.lumenlearning.com/boundless-management/
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_
the_Information_Economy
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite
d_States
https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_
the_Information_Economy
http://cnx.org/content/col11385/latest/
http://cnx.org/content/m22659/latest/
http://www.scielo.br/scielo.php?script=sci_arttext&pid=S0102-
695X2011000300003
Week
5
Ethical
Issues:
Software
Development
(i.e.,
Software
Product
Liability,
Safety
Critical
Systems, and
Software
Quality),
Quality of Life
(i.e.,
Accessibility
– Digital
Divide), and
Risk Analysis
and
Management
Read:
Module 3: Information Systems Ethics: Privacy, Accuracy,
Intellectual Property, and Accessibility . Read
Access in Information Systems
Module 4: IT Professionals, Information Systems, and Ethical
Issues Today . Read System Quality, Quality
of Life, Equity, Access, and Boundaries
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Software
Quality,
Nets, Webs, and the Information Infrastructure
(https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Informatio
n_Infrastructure): Net for us (Digital Divide).
Internet Governance (Digital Divide)
(https://en.wikibooks.org/wiki/Internet_Governance)
Risk management
(https://en.wikipedia.org/wiki/Risk_management) Risk
management, Introduction, and
Limitations
Risk (https://en.wikipedia.org/wiki/Risk) Information
technology and information security
Business Fundamentals by Donald J McCubbrey 2009
(https://www.saylor.org/site/wp-
content/uploads/2014/01/BUS501-2.1-BusinessFundamentals-
CCBY.pdf): Chapter 10 - What is IS Risk
Management?
Assignments:
Submit to LEO Assignments: Paper C1: Topic Selection –
Ethical Issue in Technology
Discussion Topic Five (DT-5)
Start work on Paper C2: Individual research paper on existing
or emerging technology and its related ethical
issues
Start working with your Group in preparation for Presentation
C3 - Group PowerPoint Presentation of research on
existing or emerging technology and its related ethical issues.
Post a synopsis of your topic selection (C1) to your
Group in the Group Collaboration for Presentation C3
Discussion Forum for further collaboration in preparation for
a group presentation
Week
6
Ethical
Issues: IT
Professionals
and Ethics of
IT
Organizations
Read:
Module 4: IT Professionals, Information Systems, and Ethical
Issues Today - Read Commentary -
Introduction, Legal Concerns, Economic Concerns, and
Governmental Concerns.
Information Technology and Ethics
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics): Ethics for IT
Professionals
Ethics for IT Professionals/What Is Ethics
(https://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/Wh
at_Is_Ethics)
Assignments:
Submit to LEO Assignments: Paper C2 – individual research on
an existing or emerging technology and its related
ethical issues.
Discussion Topic Six (DT-6)
Continue work on Presentation C3 –Group PowerPoint
Presentation – research on existing or emerging technology
and its related ethical issues Post a copy of your Paper C2 as an
attachment to your Group in the Group
Collaboration for Presentation C3 Discussion Forum so others
can read further detail to develop more information
in addition to the topic selection you previously provided.
Week
7
Ethical Issue:
Social
Networking
Read:
Effects of Social media on Kids in the Future
(https://www.youthvoices.live/2017/09/25/effects-of-social-
media-on-
kids-in-the-future/)
Living in a Connected World/Persistent Connectivity and the
Fear of Missing Out (i.e., Social Media
(https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P
ersistent_Connectivity_and_the_Fear_of_Missing_Out))
Living in a Connected World/Privacy in a Digital Age
(https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P
rivacy_in_a_Digital_Age)
Information Technology and Ethics/Social Networking and
Business
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics/Social_Networking_and_Business) Go to
Contents - Read Disadvantages and advantages of Social
Networking and Benefits of Social Networking.
Information Technology and Ethics: Social Networking and
Business; Cyber-Crimes II (Cyber-Bullying)
(https://en.wikibooks.org/wiki/Information_Technology_and_Et
hics/Cyber-Crimes_II)
Assignments:
Group Leaders submit Presentation C3 by Group to LEO
Assignments.
Discussion Topic (DT-7)
Group Leader post Presentation C3 in the Group Topic of the
Discussion Topic Eight Forum provided.
Start individual reflective Paper D on class learning
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Information
_Infrastructure
https://en.wikibooks.org/wiki/Internet_Governance
https://en.wikipedia.org/wiki/Risk_management
https://en.wikipedia.org/wiki/Risk
https://www.saylor.org/site/wp-
content/uploads/2014/01/BUS501-2.1-BusinessFundamentals-
CCBY.pdf
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics
https://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/What
_Is_Ethics
https://www.youthvoices.live/2017/09/25/effects-of-social-
media-on-kids-in-the-future/
https://en.wikibooks.org/wiki/Living_in_a_Connected_World/Pe
rsistent_Connectivity_and_the_Fear_of_Missing_Out
https://en.wikibooks.org/wiki/Living_in_a_Connected_World/Pr
ivacy_in_a_Digital_Age
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics/Social_Networking_and_Business
https://en.wikibooks.org/wiki/Information_Technology_and_Eth
ics/Cyber-Crimes_II
Week
8
Future Ethical
Challenges
Read:
Module 5: IT Ethical Challenges in the Twenty-First Century -
Read Commentary - Introduction, Malware,
Biometrics, Ubiquitous Computing, Digital Divide, Robotics
and Artificial Intelligence, Technostress, and
Conclusion.
Preparing for the Future of Artificial Intelligence
(http://scipol.duke.edu/content/preparing-future-artificial-
intelligence) - Read Executive Summary and Introduction
Where Is the Smartphone Leading the Health of Children?
(https://www.intechopen.com/books/smartphones-from-
an-applied-research-perspective/where-is-the-smartphone-
leading-the-health-of-children-) - Read in entirety
Read entire original paper: Piracy is definitely illegal
(http://www.open.edu/openlearn/society/the-law/law/piracy-
definitely-illegal)
Assignments:
Submit to LEO Assignments: Paper D - Reflective paper on
class learning
Discussion Topic (DT-8)
http://scipol.duke.edu/content/preparing-future-artificial-
intelligence
https://www.intechopen.com/books/smartphones-from-an-
applied-research-perspective/where-is-the-smartphone-leading-
the-health-of-children-
http://www.open.edu/openlearn/society/the-law/law/piracy-
definitely-illegalIFSM 304 7982 Ethics in Information
Technology (2188) IFSM-304Faculty ContactCourse
DescriptionCourse IntroductionCourse OutcomesCourse
MaterialsClass GuidelinesGrading InformationProject
DescriptionsAcademic PoliciesClass & Assignment Schedule

More Related Content

Similar to · General Design Analysis - Information is collected from library.docx

Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Donald E. Hester
 
1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric MartineMccracken314
 
1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric AbbyWhyte974
 
Updating Ict Schemes 4 Strands Of Ict
Updating Ict Schemes   4 Strands Of IctUpdating Ict Schemes   4 Strands Of Ict
Updating Ict Schemes 4 Strands Of Ictjuko101
 
Updating Ict Schemes 4 Strands Of Ict
Updating Ict Schemes   4 Strands Of IctUpdating Ict Schemes   4 Strands Of Ict
Updating Ict Schemes 4 Strands Of Ictjuko101
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docxrtodd599
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
Dunkin Donuts I.  Technology1. Describe the core techn.docx
Dunkin Donuts I.  Technology1. Describe the core techn.docxDunkin Donuts I.  Technology1. Describe the core techn.docx
Dunkin Donuts I.  Technology1. Describe the core techn.docxsagarlesley
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenshipegschool
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
Roehampton computing workshop 1
Roehampton computing workshop 1Roehampton computing workshop 1
Roehampton computing workshop 1Miles Berry
 
Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Miles Berry
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docxmariuse18nolet
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...venny55
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docxkarlhennesey
 
Loveland 090731 Naep Tech Lit Outreach
Loveland 090731 Naep Tech Lit OutreachLoveland 090731 Naep Tech Lit Outreach
Loveland 090731 Naep Tech Lit OutreachIntro Engineering
 

Similar to · General Design Analysis - Information is collected from library.docx (20)

Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009Security Awareness Training for Community Colleges 2009
Security Awareness Training for Community Colleges 2009
 
1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric
 
1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric 1 IDS 403 Final Project Part Two Guidelines and Rubric
1 IDS 403 Final Project Part Two Guidelines and Rubric
 
Updating Ict Schemes 4 Strands Of Ict
Updating Ict Schemes   4 Strands Of IctUpdating Ict Schemes   4 Strands Of Ict
Updating Ict Schemes 4 Strands Of Ict
 
Updating Ict Schemes 4 Strands Of Ict
Updating Ict Schemes   4 Strands Of IctUpdating Ict Schemes   4 Strands Of Ict
Updating Ict Schemes 4 Strands Of Ict
 
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Cpe orientation
Cpe orientationCpe orientation
Cpe orientation
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Dunkin Donuts I.  Technology1. Describe the core techn.docx
Dunkin Donuts I.  Technology1. Describe the core techn.docxDunkin Donuts I.  Technology1. Describe the core techn.docx
Dunkin Donuts I.  Technology1. Describe the core techn.docx
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
After The Deluge: Navigating IPR Policy and DRM in Learning Object Repositories
After The Deluge: Navigating IPR Policy and DRM in Learning Object RepositoriesAfter The Deluge: Navigating IPR Policy and DRM in Learning Object Repositories
After The Deluge: Navigating IPR Policy and DRM in Learning Object Repositories
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
Roehampton computing workshop 1
Roehampton computing workshop 1Roehampton computing workshop 1
Roehampton computing workshop 1
 
Y3 ssp 12 13 l12
Y3 ssp 12 13 l12Y3 ssp 12 13 l12
Y3 ssp 12 13 l12
 
IntroductionThis is an individual project. Each student must comp.docx
IntroductionThis is an individual project.  Each student must comp.docxIntroductionThis is an individual project.  Each student must comp.docx
IntroductionThis is an individual project. Each student must comp.docx
 
ICWI_2002 (1).pdf
ICWI_2002 (1).pdfICWI_2002 (1).pdf
ICWI_2002 (1).pdf
 
Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...Digital innovation as a fundamental and powerful concept in the information s...
Digital innovation as a fundamental and powerful concept in the information s...
 
Page 1 of 6 [1514] COM7005 Information S.docx
Page 1 of 6 [1514] COM7005   Information S.docxPage 1 of 6 [1514] COM7005   Information S.docx
Page 1 of 6 [1514] COM7005 Information S.docx
 
Loveland 090731 Naep Tech Lit Outreach
Loveland 090731 Naep Tech Lit OutreachLoveland 090731 Naep Tech Lit Outreach
Loveland 090731 Naep Tech Lit Outreach
 

More from alinainglis

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docxalinainglis
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docxalinainglis
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docxalinainglis
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docxalinainglis
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docxalinainglis
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docxalinainglis
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docxalinainglis
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docxalinainglis
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docxalinainglis
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docxalinainglis
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docxalinainglis
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docxalinainglis
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docxalinainglis
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docxalinainglis
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docxalinainglis
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docxalinainglis
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docxalinainglis
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docxalinainglis
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docxalinainglis
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docxalinainglis
 

More from alinainglis (20)

· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx· Present a discussion of what team is. What type(s) of team do .docx
· Present a discussion of what team is. What type(s) of team do .docx
 
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
· Presentation of your project. Prepare a PowerPoint with 8 slid.docx
 
· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx· Prepare a research proposal, mentioning a specific researchabl.docx
· Prepare a research proposal, mentioning a specific researchabl.docx
 
· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx· Previous professional experiences that have had a profound.docx
· Previous professional experiences that have had a profound.docx
 
· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx· Please select ONE of the following questions and write a 200-wor.docx
· Please select ONE of the following questions and write a 200-wor.docx
 
· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx· Please use Firefox for access to cronometer.com16 ye.docx
· Please use Firefox for access to cronometer.com16 ye.docx
 
· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx· Please share theoretical explanations based on social, cultural an.docx
· Please share theoretical explanations based on social, cultural an.docx
 
· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx· If we accept the fact that we may need to focus more on teaching.docx
· If we accept the fact that we may need to focus more on teaching.docx
 
· How many employees are working for youtotal of 5 employees .docx
· How many employees are working for youtotal of 5 employees  .docx· How many employees are working for youtotal of 5 employees  .docx
· How many employees are working for youtotal of 5 employees .docx
 
· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx· How should the risks be prioritized· Who should do the priori.docx
· How should the risks be prioritized· Who should do the priori.docx
 
· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx· How does the distribution mechanism control the issues address.docx
· How does the distribution mechanism control the issues address.docx
 
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docx
 
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx· Global O365 Tenant Settings relevant to SPO, and recommended.docx
· Global O365 Tenant Settings relevant to SPO, and recommended.docx
 
· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx· Focus on the identified client within your chosen case.· Analy.docx
· Focus on the identified client within your chosen case.· Analy.docx
 
· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx· Find current events regarding any issues in public health .docx
· Find current events regarding any issues in public health .docx
 
· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx· Explore and assess different remote access solutions.Assig.docx
· Explore and assess different remote access solutions.Assig.docx
 
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docx
 
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
· Due Sat. Sep. · Format Typed, double-spaced, sub.docx
 
· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx· Expectations for Power Point Presentations in Units IV and V I.docx
· Expectations for Power Point Presentations in Units IV and V I.docx
 
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docx
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

· General Design Analysis - Information is collected from library.docx

  • 1. · General Design Analysis - Information is collected from library/internet sources on a design problem that is local, nationwide, or worldwide in scope. A number of journals available online are an excellent place to start The effect of alternate fuels on vehicle performance · It is important for your paper to be well structured. Although each paper will be different, most papers should have: · A. Problem Statement, including the significance of the problem and who is likely to be interested in the solution. · B. Evaluation of the important factors involved in solving the problem. · C. Presentation of one or more proposed solutions. · D. Conclusions 12/3/2018 Week 8 Assignment Paper D - IFSM 304 7982 Ethics in Information Technology (2188) https://learn.umuc.edu/d2l/le/content/329020/viewContent/1297 6314/View 1/1 Week 8 Assignment Paper D Instructions
  • 2. Paper D: Reflective paper on class learning. Consider this assignment as a reflective piece on class learning as it applies to Ethics in Information Technology. It describes your Ah-haor Eureka moments. It is hoped that this course made you think about the ethical issues that occur in your personal and work lives and how to go about making ethical choices. Please use the ideas you learned from this course; how you will synthesize what you learned from your research about your topic including - over-arching issues, readings, discussion from class, and conclusions from other assignments that apply to your research. Please address the following elements: From a class learning perspective, what were some of your “take-aways?” How has this impacted your understanding of the ethical issues? What will you do differently? How has what you have learned in this course influenced your career? As we continue to move toward a global community, what new challenges might we see relating to ethics in IT? You are to prepare a reflective piece of not more than 2-3 pages, double- spaced and submit it to your Assignment Folder as an attached Microsoft Word file. This paper may be subjective in nature!
  • 3. javascript:void(0); https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3 47/Previous?pId=12976197 https://learn.umuc.edu/d2l/le/content/329020/navigateContent/3 47/Next?pId=12976197 Faculty Contact Linda Beach [email protected] Course Description Recommended: IFSM 201. A comprehensive study of ethics and of personal and organizational ethical decision making in the use of information systems in a global environment. The aim is to identify ethical issues raised by existing and emerging technologies, apply a structured framework to analyze risk and decision alternatives, and understand the impact of personal ethics and organizational values on an ethical workplace. Course Introduction The word ethics has its root in the word ethos, which most often refers to character. The concepts of ethics, character, right and wrong, and good and evil have captivated humankind ever since we began to live in groups, communicate, and pass judgment on each others' actions based on motivation, group rules and norms, and intermediate and end results. Thinking about ethics can begin with the individual, and then expand into group, societal, and cultural ethical considerations. From this foundation, we can apply (and test against) known theories and frameworks to information systems and situations in the modern
  • 4. age. Can ethics and personal character apply, and in the same ways, in the modern information- and data-based world in which we currently live, work, and function? Discovering this application, and determining the degree to which it satisfies logic, justice, ethical truths, and modern reality, is the overarching goal of this course. While ethics is important for its own sake, we, as information- systems professionals, have a particular responsibility to understand and apply ethics to our professional actions and decisions. Character, goodness, and just actions are certainly important for everyone, as they have been throughout history—and the more power the individual possesses due to political position or wealth, the greater the ramifications of character or the lack of it. However, in no previous age has the technology for information retrieval, storage, and communication possessed such potential to change power structures and be the source of power itself. In the modern era, information systems managers and professionals exercise a new kind of power, with broad and often instant ramifications. This power—gained through technical expertise—requires a new level of social responsibility. This responsibility is satisfied through a development of understanding of ethics in Information Technology and the application of ethics to their own decision-making process. After reviewing a foundation of ethical thought and becoming familiar with ethical theories, frameworks, and approaches, you will be able to consider several key aspects of modern information systems that currently challenge information professionals and citizens of networked and computing-dependent societies. Through the use of vignettes,
  • 5. you will consider issues affecting ethics for IT workers and IT users; privacy and intellectual property; the impact of IT on productivity and quality of life; and the tradeoffs between laws guiding group needs and individual needs. After gaining a basic understanding of ethics, you will examine privacy/accuracy and property/accessibility, seeing a broader and more complex array of modern ethical questions in information systems and direct challenges facing information systems professionals today. You will explore future challenges as you consider how things may change and what ethical behavior will appear in information systems as the twenty-first century unfolds. The language and facts of information systems and computing have changed the world, and touched and changed lives. This industry has spawned, and continues to spawn, new concepts and new language, and it does so with extreme rapidity. On the other hand, ethics, which was often a study of the ancients, examines unchanging truths. With many obvious differences in the concepts and practicalities, a shared aspect of both computing and ethics is universality. The time-tested and largely globally shared concepts of basic ethics mirror in many ways the universal language of programming and operating systems. The fun begins as we apply time-tested ethical frameworks to determine correct actions and decisions in this information systems world of ones and zeros; of self-replicating, anonymous, and invisible actors; and of the global marketplace for information instead of more concrete and physical goods and services. The study of ethics in the Information Technology is fascinating and mentally
  • 6. challenging, and this course should equip and guide your journey into this ethics and information maelstrom. Course Outcomes After completing this course, you should be able to: Apply relevant ethical theories, laws, regulations, and policies to decision making to support organizational compliance. Apply decision-making framework to analyze risks and decision alternatives at different levels of an organization. Identify and address new and/or increased ethical issues raised by existing and emerging technologies. Analyze the impact of personal and organizational ethics in order to foster and support an ethical workforce. Course Materials Click to access your course materials information (http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM%203 04&S=7982&Sem=2188) Class Guidelines Contacting your Faculty Member University of Maryland University College • Adelphi • Syllabus • IFSM 304 7982 ETHICS IN INFORMATION TECHNOLOGY (2188) IFSM-304 Fall 2018 Section 7982 3 Credits 10/22/2018 to 12/16/2018
  • 7. http://webapps.umuc.edu/UgcmBook/BPage.cfm?C=IFSM 304&S=7982&Sem=2188 You can use the Pager feature within the classroom to send a message to your faculty member. Contacting the Department If you have questions related to the course content or any of the graded deliverables, please contact the instructor. For questions and concerns related to advising, please write to [email protected] (mailto:[email protected]) or call (301) 985-7000 or, toll-free (800) 888-8682. For other questions and concerns, you can contact your Program Chair by writing to [email protected] (mailto:[email protected]) or by calling (240) 684-2840. Please be sure to mention the course name, course number, and your section number in the "Subject:" field of your e-mail. Course Materials This course uses e-resources posted in the classroom. Assigned readings and videos, or links to them, may also be posted in the classroom. Software Requirements
  • 8. Students have free access to Google software tools through their UMUC Google mail accounts and Google Drive. Google Drive is also a good environment for collaborative document creation. In addition, there are other free, open software tools that students may use. Rather than require students to purchase Microsoft Office applications, they may use whatever tool they have as long as the document created can be read by the faculty member using Microsoft Office. The responsibility is on the student to ensure the readability of their products and the retention of the formatting when they are opened and read in Microsoft Office. Additional Information Effective writing is critical to the intellectual life of university students and graduates within the workplace. Effective managers are usually effective communicators. Your work in this course must demonstrate your ability to master and effectively communicate course content. Effective writing Meets the needs of the reader Adequately covers the subject Uses expected conventions of format and organization Demonstrates use of credible reasoning and evidence Satisfies standards of style and grammatical correctness Requires 100% compliance with UMUC's zero-tolerance policy regarding plagiarism This class uses APA style and format for all assignments. All materials submitted must be original materials developed by
  • 9. the student solely for use in this class and must conform to UMUC’s academic policies. Submission of reused materials may result in a reduced grade or non-acceptance of the assignment at the faculty member’s discretion. For more information about student services and other general information, visit UMUC’s website at http://www.umuc.edu/ (http://www.umuc.edu/) Grading Information This course consists of the following graded items: Conference participation 16% Analysis of current events posting on IT-related ethical global issues (multinational corporation) 5% Paper A: apply decision-making frameworks to IT-related ethical issues (individual) 15% Paper B1 (matrix): IT-related ethical organizational issue applying relevant laws, regulations, and policies (individual) 12% Paper B2: organizational policy to
  • 10. address an ethical IT workforce issue (individual) 12% Paper C1: select topic and identify three critical questions related to the (individual) 3% mailto:[email protected] mailto:[email protected] http://www.umuc.edu/ Paper C2: – Individual research paper on existing or emerging technology and related ethical issue 12% Paper C3: group presentation: research on emerging technologies and issues (group) 15% Paper D: individual reflection on class learning (individual) 10% Total 100%
  • 11. Participation By registering for a web-based, hybrid, or face-to-face course, you have made a commitment to participate in your course conferences as well as other online and face-to-face activities. Plan to participate regularly. Participation for this course is defined as proactive discussion in weekly conferences, discussion questions, and study group activities. This requires you to actively reflect on weekly module and textbook readings and to develop original ideas in your responses. Participation for this course is also defined as your proactive engagement in face-to- face meetings, if applicable. When participating in a hybrid course, the online portion requires your participation each week throughout the semester, even during weeks when the class meets face to face. Your online sessions will focus on conference discussions, study group activities, and homework assignments. Face-to-face sessions will be used for instructional lectures, class oral presentations, and quizzes/tests. The hybrid classroom allows you to benefit from face-to-face interaction with the instructor and other students, but also gives busy UMUC students the opportunity to work from home for a significant portion of the course. You are expected to demonstrate critical thinking and your understanding of the content in the assigned readings as they relate to the issues identified in the conference discussion. You are expected to make your own contribution in a main topic as well as respond
  • 12. with value-added comments to at least two of your classmates. You are encouraged to respond to other students as well as to your instructor. You will note in the grading policy that your online conference participation counts significantly toward your final grade. You are expected to adhere to the general rules of online etiquette. Participation must be completed the week due. Please review the Grading Rubric for Participation, as shown below: Responded to discussion topic (by Wednesday midnight) and two classmates’ postings (by Sunday midnight); postings and questions posed are relevant to the discussion topic, well supported with outside research or assigned readings as appropriate, add value to the discussion, and demonstrate student’s understanding of concepts. 2.0 (A) Responded to discussion topic (by Wednesday midnight) and to two classmates’ postings (by the end of the class week) postings and questions posed are relevant to the discussion topic, supported with outside research or assigned readings as appropriate, add value to the discussion, and demonstrate student’s understanding of concepts but may lack depth, completeness, or relevant research 1.6 (B) Responded to discussion topic (by Wednesday midnight) and one or two responses to classmates’ postings; postings meet minimum requirements but lack sufficient depth or supporting research.
  • 13. 1.4 (C) Late response to discussion topic, and 1 or 2 responses to classmates’ postings (by the end of the class week); and/or lack of sufficient depth, supporting research, demonstration of understanding of concepts. 1.2 (D) No participation in the discussion. 0 (F) Final Examination There is no final examination for this course, as your grade is based on a series of assignments that constitute an authentic assessment developed into a Learning Portfolio. See Other Information below. Late Policy: Assignments are expected to be submitted on time. Students have a long lead time in which to prepare, ask questions, and seek help. A late assignment will be penalized unless a major accident, illness, or deployment (for active duty military), with supporting documentation, prevents a student from submitting their assignment on time. Late discussion posts will not be accepted.Unless we have
  • 14. communicated differently, students have one late week to make up assignments with a 10% penalty assigned. Students should keep their instructor informed in advance about military deployments or other events that may impact their progress and participation in the course. All assignments must be submitted by the end of class, 11:59 PM, EST/EDT. UMUC is on Eastern Standard time and all activities and communications will be based on this time zone. No assignments will be accepted after the last day of class regardless of the circumstances. Extra Credit: Extra credit is not available. Project Descriptions Learning Portfolio Throughout this course you will learn about the impact of digital technology on ethical behavior in the twenty-first century. You will complete a series of assignments that provide an opportunity to demonstrate your knowledge of course concepts, demonstrate your ability to analyze ethical issues, and apply your conclusions to real-world situations. Collectively, these will comprise your Learning Portfolio for this course. At the end of the semester, you will participate in a group that will prepare a summary PowerPoint presentation as evidence of the learning and reflection on readings, discussion, and research. Detailed instructions and assessment criteria are included in Course
  • 15. Content within the week descriptions. . Assignments: 1) Current Events Article – Identify a current (2016 source or later) article and summarize its key points, analyze its multi- national and global aspects, and determine three critically important questions you would like to address regarding the article. 2) Paper A: Apply a decision-making framework to an IT- related ethical issue. This requires a 3-5 page paper addressing a leading ethical issue (suggested topics are provided in the Conference Session One details located in Course Content). You will use a decision- making framework from UMUC Module Two to analyze the issue and select one of the four common approaches to ethical decision making, from UMUC Module One. 3) Paper B1 – Privacy-related Matrix. You will analyze a key IT-related organizational ethical issue and complete a provided template (see Course Content) to produce a matrix mapping how this issue is affected by laws, regulations, and policies. 4) Paper B2- Organizational Policy paper. Write an organizational or personal policy to correct, modify, or address the effects of the IT-related ethical issue that you described in Paper B1. 5) Paper C1 – Topic Selection for a research paper (Paper C2) on an existing or emerging technology and its related ethical
  • 16. issues. Select a topic, explain your selection, and determine three critically important questions that you will address through research for Paper C2. These questions will form the thesis for the Paper C2 assignment. Note: You must receive prior approval from your instructor on your topic before proceeding with your research. (This is the first part of a 3-part assignment.) 6) Paper C2 – Individual research paper on existing or emerging technology and related ethical issue. (This is the second part of a 3-part assignment.) 7) Presentation C3 – Group PowerPoint presentation – groups will share their individual papers (Papers C1 and C2) and gain consensus on the final topic from among the individual team members. A slide presentation based on the group consensus and collaborative development will introduce the topic and rationale for selection; provide research results on emerging technologies and related issues; provide summary and conclusion; and references. 8) Paper D – Reflective paper on class learning. This paper will include key concepts you learned from this course, especially how you will synthesize what you learned from your C2/C3 research, and discuss how this has impacted your understanding of the ethical issues, what you may do differently in the future, how this course may have influenced your career, and what new challenges might you anticipate relating to ethics in IT in the future.
  • 17. Academic Policies Academic Policies and Guidelines ACADEMIC INTEGRITY As a member of the University of Maryland University College (UMUC) academic community that honors integrity and respect for others you are expected to maintain a high level of personal integrity in your academic work at all times. Your work should be original and must not be reused in other courses. CLASSROOM CIVILITY Students are expected to work together cooperatively, and treat fellow students and faculty with respect, showing professionalism and courtesy in all interactions. Please review the Code of Civility for more guidance on interacting in UMUC classrooms: https://www.umuc.edu/students/support/studentlife/conduct/cod e.cfm (https://www.umuc.edu/students/support/studentlife/conduct/cod e.cfm). POLICIES AND PROCEDURES UMUC is committed to ensuring that all individuals are treated equally according to Policy 040.30 Affirmative Action, Equal Opportunity, and Sexual Harassment (https://www.umuc.edu/policies/adminpolicies/admin04030.cfm
  • 18. ). Students with disabilities who need accommodations in a course are encouraged to contact the Office of Accessibility Services (OAS) at [email protected] (mailto:[email protected]), or call 800-888- UMUC (8682) or 240-684-2287. The following academic policies and procedures apply to this course and your studies at UMUC. 150.25 Academic Dishonesty and Plagiarism (https://www.umuc.edu/policies/academicpolicies/aa15025.cfm) – UMUC defines academic dishonesty as the failure to maintain academic integrity. All charges of academic dishonesty will be brought in accordance with this Policy. Note: In this course, your instructor has access to use Turnitin.com, a tool that helps to evaluate the originality of student work. Your instructor may use Turnitin or other resources to check the authenticity of your work and the accuracy of your use of sources. To learn more about Turnitin, the feedback it provides, and your options regarding the storage of your work in the Turnitin database go to the UMUC guides at umuc.edu/library/libresources/turnitin- students.cfm (https://www.umuc.edu/library/libresources/turnitin.cfm) and http://sites.umuc.edu/library/libresources/turnitin.cfm#studentco pyright (http://sites.umuc.edu/library/libresources/turnitin.cfm). If you have questions about academic integrity or how to cite your sources go to the UMUC Academic Integrity Resources page at http://www.umuc.edu/current-students/learning- resources/academic-integrity/resources.cfm (http://www.umuc.edu/current-%20students/learning- resources/academic- integrity/resources.cfm).
  • 19. 151.00 Code of Student Conduct (https://www.umuc.edu/policies/studentpolicies/stud15100.cfm) 170.40 170.41 170.42 The following policies describe the requirements for the award of each degree: Degree Completion Requirements for the Graduate School (https://www.umuc.edu/policies/academicpolicies/aa17040.cfm) Degree Completion Requirements for a Bachelor’s Degree (https://www.umuc.edu/policies/academicpolicies/aa17041.cfm) Degree Completion Requirements for an Associate’s Degree (https://www.umuc.edu/policies/academicpolicies/aa17042.cfm) 170.71 Policy on Grade of Incomplete (https://www.umuc.edu/policies/academicpolicies/aa17071.cfm) - The mark of I is exceptional and considered only for certain courses. Students who have completed 60% of their coursework with a grade of B or better for graduate courses or C or better for undergraduate courses and request an I before the end of the term. The mark of I is not available for noncredit courses. 170.72 Course Withdrawal Policy (https://www.umuc.edu/policies/academicpolicies/aa17072.cfm) - Students must follow drop and withdrawal procedures and deadlines available at https://www.umuc.edu/ (https://www.umuc.edu/) under Academic Calendar. 130.80 Procedures for Review of Alleged Arbitrary and Capricious Grading (https://www.umuc.edu/policies/academicpolicies/aa13080.cfm)
  • 20. – appeals may be made on final course grades as described herein. 205.06 Calculation Of Grade-Point Average (GPA) for Inclusion on Transcripts and Transcript Requests (https://www.umuc.edu/policies/academicpolicies/aa20506.cfm) – Note: Undergraduate and Graduate Schools have different Grading Policies (i.e. The Graduate School does not award the grade of D). See Course Syllabus for Grading Policies. GRADING According to UMUC’s grading policy, the following marks are used: Undergraduate Graduate https://www.umuc.edu/students/support/studentlife/conduct/cod e.cfm https://www.umuc.edu/policies/adminpolicies/admin04030.cfm mailto:[email protected] https://www.umuc.edu/policies/academicpolicies/aa15025.cfm https://www.umuc.edu/library/libresources/turnitin.cfm http://sites.umuc.edu/library/libresources/turnitin.cfm http://www.umuc.edu/current- students/learning- resources/academic-integrity/resources.cfm https://www.umuc.edu/policies/studentpolicies/stud15100.cfm https://www.umuc.edu/policies/academicpolicies/aa17040.cfm https://www.umuc.edu/policies/academicpolicies/aa17041.cfm https://www.umuc.edu/policies/academicpolicies/aa17042.cfm https://www.umuc.edu/policies/academicpolicies/aa17071.cfm https://www.umuc.edu/policies/academicpolicies/aa17072.cfm https://www.umuc.edu/
  • 21. https://www.umuc.edu/policies/academicpolicies/aa13080.cfm https://www.umuc.edu/policies/academicpolicies/aa20506.cfm A 90-100 90-100 B 80-89 80-89 C 70-79 70-79* D 60-69 N/A** F 59 or below 69 or below FN Failure-Non attendance Failure-Non attendance G Grade Pending Grade Pending P Passing Passing S Satisfactory Satisfactory U Unsatisfactory Unsatisfactory I Incomplete Incomplete AU Audit Audit W Withdrew Withdrew * The grade of "B" represents the benchmark for The Graduate School. Students must maintain a Grade Point Average (GPA) of 3.0 or higher. Classes where final grade of C or F places a student on Academic Probation must be repeated. ** The Graduate School does not award the grade of D. COURSE EVALUATION SURVEY UMUC values its students' feedback. You will be asked to complete an online evaluation toward the end of the term. The primary purpose of
  • 22. this evaluation process is to assess the effectiveness of classroom instruction in order to provide the best learning experience possible and make continuous improvements to every class. Responses are kept confidential. Please take full advantage of this opportunity to provide your feedback. LIBRARY SUPPORT Extensive library resources and services are available online, 24 hours a day, seven days a week at https://www.umuc.edu/library/index.cfm (https://www.umuc.edu/library/index.cfm) to support you in your studies. The UMUC Library provides research assistance in creating search strategies, selecting relevant databases, and evaluating and citing resources in a variety of formats via its Ask a Librarian service at https://www.umuc.edu/library/libask/index.cfm (https://www.umuc.edu/library/libask/index.cfm). EXTERNAL LINK DISCLAIMER This course may contain links to external sites neither owned nor maintained by UMUC. UMUC bears no responsibility for the accuracy, legality, or content of external sites or for that of subsequent links. In addition, the terms of use, security policies, and privacy policies may differ from those of UMUC. Contact the external site for answers to questions regarding its content, terms of use, and policies. LEARNING MANAGEMENT SYSTEM SUPPORT To successfully navigate the online classroom new students are encouraged to view the Classroom Walkthrough under Help in the upper right
  • 23. menu of the LEO classroom. Those requiring technical assistance can access [email protected] Support directly in LEO under the Help menu. Additional technical support is available 24 hours a day, seven days a week via self-help and live chat at https://www.umuc.edu/help (https://www.umuc.edu/help) or by phone toll-free at 888-360- UMUC (8682). SYLLABUS CHANGES All items on this syllabus are subject to change at the discretion of the Instructor and the Office of Academic Affairs. Class & Assignment Schedule Students can access their complete list of assignments and their corresponding due dates within the Assignments section of the classroom by navigating to the Assignments section of the class from the main navigation bar. Click the link below, and then click Assignments, for a video demonstration on how to utilize the assignment list feature. Classroom Walkthrough (http://www.umuc.edu/students/leo/videos.cfm) Students also have access to a calendar tool on the course homepage within the classroom. Week Topics Readings/Assignments - All assignments must be posted to the Assignments Folder in LEO by 11:59 p.m. U.S. East Coast time on the date due. (Links to reading material also available in the Course Content section) https://www.umuc.edu/library/index.cfm
  • 24. https://www.umuc.edu/library/libask/index.cfm https://www.umuc.edu/help http://www.umuc.edu/students/leo/videos.cfm Week 1 Introduction to Ethics Read: Module 1: Introduction to Ethical Theories Boundless by Lumen Learning (https://courses.lumenlearning.com/boundless-management/): Go to Ethics in Business, select Ethics, an Overview, read Defining Ethics; Ethics Training; The Manager’s Role in Ethical Conduct; Blurring Ethical Lines; and Business Ethics Around the Globe, then select Corporate Social Responsibility. Assignment: Submit to LEO Assignments: Paper CE involving a Current Events article on an IT-related Ethical Global issue (multi-national corporation) Discussion Topic One (DT-1) Start Paper A: application of decision-making frameworks to IT-related ethical issues Week
  • 25. 2 Ethical Decision- Making Read: Module 2: Methods of Ethical Analysis Boundless by Lumen Learning (https://courses.lumenlearning.com/boundless-management/): Go to Ethics in Business, select Maintaining Ethical Standards, read Ethical Decision Making; Training Ethical Decision Making; Managers Role in Ethical Conduct; and Codes of Conduct Assignments: Submit to LEO Assignments: Paper A –application of decision making frameworks to an IT-related ethical issue Discussion Topic Two (DT-2) Start Paper B1 - Matrix: IT-related ethical organizational issue applying selected principles Week 3 Ethical Issues: Computer and Internet Crime, Security, and
  • 26. Privacy. Read: Module 3: Information Systems Ethics: Privacy, Accuracy, Intellectual Property, and Accessibility - Read Commentary: Introduction, Privacy Issues in Information Systems and Accuracy and Accountability Issues in Information Systems Information Technology and Ethics (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics): Computer and Internet Crime Legal and Regulatory Issues in the Information Economy (https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in _the_Information_Economy): Consumer Privacy and Protection, Cybercrimes Assignments: Submit to LEO Assignments: Paper B1 - Matrix: IT-related ethical organizational issue applying selected principles Discussion Topic Three (DT-3) Start Paper B2- an Organizational Policy to address an IT- related ethical issue. Week 4 Ethical Issues: Freedom of Expression, Intellectual Property, and
  • 27. Plagiarism Read: Module 3: Information Systems Ethics: Privacy, Accuracy, Intellectual Property, and Accessibility - Read Intellectual Property Issues in Information Systems, Property Rights and Law, and Plagiarism Information Technology and Ethics (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics): Intellectual Property Information Technology and Ethics (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics): Freedom of Expression Read in entirety: Freedom of speech in the United States (https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite d_States) Legal and Regulatory Issues in the Information Economy (https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in _the_Information_Economy): Ideas Trade Secrets and Intellectual Property Read in entirety: Copyright For The Rest Of Us (http://cnx.org/content/col11385/latest/) Read in entirety: The Scope of Copyright Law (http://cnx.org/content/m22659/latest/) Read in entirety: The academic plagiarism and its punishments - a review (http://www.scielo.br/scielo.php? script=sci_arttext&pid=S0102-695X2011000300003) Assignments: Submit to LEO Assignments: Paper B2- an Organizational Policy to address an IT-related ethical issue. Discussion Topic Four (DT-4) Start Paper C1: Topic Selection for individual research on an
  • 28. existing or emerging technology and its related ethical issues https://courses.lumenlearning.com/boundless-management/ https://courses.lumenlearning.com/boundless-management/ https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_ the_Information_Economy https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics https://en.wikipedia.org/wiki/Freedom_of_speech_in_the_Unite d_States https://en.wikibooks.org/wiki/Legal_and_Regulatory_Issues_in_ the_Information_Economy http://cnx.org/content/col11385/latest/ http://cnx.org/content/m22659/latest/ http://www.scielo.br/scielo.php?script=sci_arttext&pid=S0102- 695X2011000300003 Week 5 Ethical Issues: Software Development
  • 29. (i.e., Software Product Liability, Safety Critical Systems, and Software Quality), Quality of Life (i.e., Accessibility – Digital Divide), and Risk Analysis and Management Read: Module 3: Information Systems Ethics: Privacy, Accuracy, Intellectual Property, and Accessibility . Read Access in Information Systems Module 4: IT Professionals, Information Systems, and Ethical Issues Today . Read System Quality, Quality of Life, Equity, Access, and Boundaries Information Technology and Ethics (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics): Software Quality, Nets, Webs, and the Information Infrastructure (https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Informatio n_Infrastructure): Net for us (Digital Divide). Internet Governance (Digital Divide) (https://en.wikibooks.org/wiki/Internet_Governance) Risk management
  • 30. (https://en.wikipedia.org/wiki/Risk_management) Risk management, Introduction, and Limitations Risk (https://en.wikipedia.org/wiki/Risk) Information technology and information security Business Fundamentals by Donald J McCubbrey 2009 (https://www.saylor.org/site/wp- content/uploads/2014/01/BUS501-2.1-BusinessFundamentals- CCBY.pdf): Chapter 10 - What is IS Risk Management? Assignments: Submit to LEO Assignments: Paper C1: Topic Selection – Ethical Issue in Technology Discussion Topic Five (DT-5) Start work on Paper C2: Individual research paper on existing or emerging technology and its related ethical issues Start working with your Group in preparation for Presentation C3 - Group PowerPoint Presentation of research on existing or emerging technology and its related ethical issues. Post a synopsis of your topic selection (C1) to your Group in the Group Collaboration for Presentation C3 Discussion Forum for further collaboration in preparation for a group presentation Week 6 Ethical Issues: IT Professionals and Ethics of IT Organizations
  • 31. Read: Module 4: IT Professionals, Information Systems, and Ethical Issues Today - Read Commentary - Introduction, Legal Concerns, Economic Concerns, and Governmental Concerns. Information Technology and Ethics (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics): Ethics for IT Professionals Ethics for IT Professionals/What Is Ethics (https://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/Wh at_Is_Ethics) Assignments: Submit to LEO Assignments: Paper C2 – individual research on an existing or emerging technology and its related ethical issues. Discussion Topic Six (DT-6) Continue work on Presentation C3 –Group PowerPoint Presentation – research on existing or emerging technology and its related ethical issues Post a copy of your Paper C2 as an attachment to your Group in the Group Collaboration for Presentation C3 Discussion Forum so others can read further detail to develop more information in addition to the topic selection you previously provided. Week 7 Ethical Issue: Social Networking Read:
  • 32. Effects of Social media on Kids in the Future (https://www.youthvoices.live/2017/09/25/effects-of-social- media-on- kids-in-the-future/) Living in a Connected World/Persistent Connectivity and the Fear of Missing Out (i.e., Social Media (https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P ersistent_Connectivity_and_the_Fear_of_Missing_Out)) Living in a Connected World/Privacy in a Digital Age (https://en.wikibooks.org/wiki/Living_in_a_Connected_World/P rivacy_in_a_Digital_Age) Information Technology and Ethics/Social Networking and Business (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics/Social_Networking_and_Business) Go to Contents - Read Disadvantages and advantages of Social Networking and Benefits of Social Networking. Information Technology and Ethics: Social Networking and Business; Cyber-Crimes II (Cyber-Bullying) (https://en.wikibooks.org/wiki/Information_Technology_and_Et hics/Cyber-Crimes_II) Assignments: Group Leaders submit Presentation C3 by Group to LEO Assignments. Discussion Topic (DT-7) Group Leader post Presentation C3 in the Group Topic of the Discussion Topic Eight Forum provided. Start individual reflective Paper D on class learning https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics https://en.wikibooks.org/wiki/Nets,_Webs_and_the_Information _Infrastructure
  • 33. https://en.wikibooks.org/wiki/Internet_Governance https://en.wikipedia.org/wiki/Risk_management https://en.wikipedia.org/wiki/Risk https://www.saylor.org/site/wp- content/uploads/2014/01/BUS501-2.1-BusinessFundamentals- CCBY.pdf https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics https://en.wikibooks.org/wiki/Ethics_for_IT_Professionals/What _Is_Ethics https://www.youthvoices.live/2017/09/25/effects-of-social- media-on-kids-in-the-future/ https://en.wikibooks.org/wiki/Living_in_a_Connected_World/Pe rsistent_Connectivity_and_the_Fear_of_Missing_Out https://en.wikibooks.org/wiki/Living_in_a_Connected_World/Pr ivacy_in_a_Digital_Age https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics/Social_Networking_and_Business https://en.wikibooks.org/wiki/Information_Technology_and_Eth ics/Cyber-Crimes_II Week 8 Future Ethical Challenges Read: Module 5: IT Ethical Challenges in the Twenty-First Century - Read Commentary - Introduction, Malware, Biometrics, Ubiquitous Computing, Digital Divide, Robotics and Artificial Intelligence, Technostress, and Conclusion. Preparing for the Future of Artificial Intelligence
  • 34. (http://scipol.duke.edu/content/preparing-future-artificial- intelligence) - Read Executive Summary and Introduction Where Is the Smartphone Leading the Health of Children? (https://www.intechopen.com/books/smartphones-from- an-applied-research-perspective/where-is-the-smartphone- leading-the-health-of-children-) - Read in entirety Read entire original paper: Piracy is definitely illegal (http://www.open.edu/openlearn/society/the-law/law/piracy- definitely-illegal) Assignments: Submit to LEO Assignments: Paper D - Reflective paper on class learning Discussion Topic (DT-8) http://scipol.duke.edu/content/preparing-future-artificial- intelligence https://www.intechopen.com/books/smartphones-from-an- applied-research-perspective/where-is-the-smartphone-leading- the-health-of-children- http://www.open.edu/openlearn/society/the-law/law/piracy- definitely-illegalIFSM 304 7982 Ethics in Information Technology (2188) IFSM-304Faculty ContactCourse DescriptionCourse IntroductionCourse OutcomesCourse MaterialsClass GuidelinesGrading InformationProject DescriptionsAcademic PoliciesClass & Assignment Schedule