Last modified: 20 August 2012 by R.Levow: Original posting.
Professor: Roy B. Levow Textbooks: CyberEthics Morality and Law in CyberSpace, 4rd edition, Richard A. Spinello, Jones and Bartlett, 2011, ISBN 978-0-7637-0015-9 Information Security Illuminated, Michael Solomon and Mike Chapple, Jones and Bartlett, 2005, ISBN 0-7637-2677-X Current Events: ACM TECHNews, C-Net Tech News, Ziff-Davis Tech Update Reference Sites: ACM Code of Ethics, IEEE Code of Ethics
Prerequisite: B.I.E.T. major with at least 30 credits of computing courses and ENC 2210 (or ENC 1102).
Catalog Description
Study of ethical, legal, and security issues in computing. Ethical and legal topics covered include computer law, privacy, intellectual property rights, social impact of computing, and professional ethics. Security issues include physical, software system, and network security. Students will do oral and written technical reports that will be graded for writing, presentation, and content.
Course Objectives
On completion of the course, students will have demonstrated the following knowledge or skills.
- Understand major of social issues related to computing.
- Understanding ethical issues related to work as a computing professional.
- Understanding the principles of information system security.
- The ability to do oral effective presentations related to Informaiton Engineering Technology.
- The ability to write technical reports and documents related to Information Engineering Technology.
Class Syllabus (times are approximate)
- Course Introduction
Introduction to ethics: principles, frameworks, normative principles (1 week)
- Free speech and regulation of the internet (1.5 week)
- Intellectual property and protections: copyrights and patents for IT (1.5 weeks)
- Protecting private information in information systems and on the internet (1 week)
- Introduction to information security (1 week)
- Exam I (topics 1-5) (does not replace lecture)
- Access control techniques (1 week)
- General security principles (1 week)
- The business case for security (1 week)
- Cryptographic techniques (1 week)
- Network security and firewalls (2 week)
- Security threats, detection, and prevention (3 week)
- Exam II (topics 6-11)
Assignments will be posted in Blackboard
Class Policies and Grading
The grade will be based on student work on assignments, exams, and participation in class. Regular participation in class discussions is a required element of the course. Written assignments will be submitted using Blackboard. Exams will be administered online using Blackboard. The final grade will be weighted as follows: Assignments 50%, Midterm Exam 20%, Final Exam 20%, Participation 10%.
Click here for general information on course policies including program submission, late penalties, getting help, etc.
Plagiarism and SafeAssign
Writing assignments will be submitted through Blackboard to SafeAssign, a plagiarism detection service Material in your report that is quoted from or derived from another source must be appropriately identified and referenced with a proper citation. Significant failure to follow these guidelines will result in a failing grade for the course and may lead to the filing of an Academic Irregularity report.
|