Social and Professional issues in Information Technology
In today's generation, information technology changes constantly and rapidly. As such, there is need for considerate attention to these rapid changes. This requires a basic understanding of IT history, an awareness of current issues, and a familiarity with ethics. The essence of this course is to introduce a carefully composed coverage of professional and ethical problems and issues encountered by computer professionals in today?s environment. This course will cover exciting issues such as listed below including social networking, government surveillance, privacy laws, computer security and reliability, and intellectual property from all points of view.
After successfully completing this course, the student will: ? Be familiar with some of the issues you may face as a member of a complex technological society. ? Be able to discuss the benefits offered by computing technology in many different areas and the risks and problems associated these technologies. ? Understand some social, legal, philosophical, political, constitutional and economical issues related to computers and the historical background of these issues ? Be able to determine the impact of the privacy laws on information security policies. ? Understand the issues related to intellectual freedom, intellectual property, and copyright law as they relate to electronic publishing. ? Be able to determine and identify ethical procedures and behaviors in the organization related to information security. ? Be able to identify issues of professional conduct in information technology case studies. ? Learn the areas most impacted by ethical decisions by professionals in the computing field and will gain skills in making such decisions. ? Apply theories of ethics to case situations in the context of organizational use of information technology. ? Understand the ethical issues associated with gathering, storing and accessing genetic information in databases. ? Recognize the differences in ethical codes of conduct in different cultures and countries. (Adapted from Faculty of Technology Web page, Al Albayt University
Course Texts:
Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
- Ethical issues in the write place, in work-teams and with clients
- moral values in the light of generation, culture, heritage and technology
- implications of technology, globally and in Nigeria.
- Computer abuse, crime detection, legal issues in the IT profession
- community, global and environmental responsibility of computer professional
- ethical codes and personal responsibility.
After successfully completing this course, the student will: ? Be familiar with some of the issues you may face as a member of a complex technological society. ? Be able to discuss the benefits offered by computing technology in many different areas and the risks and problems associated these technologies. ? Understand some social, legal, philosophical, political, constitutional and economical issues related to computers and the historical background of these issues ? Be able to determine the impact of the privacy laws on information security policies. ? Understand the issues related to intellectual freedom, intellectual property, and copyright law as they relate to electronic publishing. ? Be able to determine and identify ethical procedures and behaviors in the organization related to information security. ? Be able to identify issues of professional conduct in information technology case studies. ? Learn the areas most impacted by ethical decisions by professionals in the computing field and will gain skills in making such decisions. ? Apply theories of ethics to case situations in the context of organizational use of information technology. ? Understand the ethical issues associated with gathering, storing and accessing genetic information in databases. ? Recognize the differences in ethical codes of conduct in different cultures and countries. (Adapted from Faculty of Technology Web page, Al Albayt University
Course Texts:
Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
Course Outline
1. Ethical and Social Issues in Information Systems
Reference: Chapter 4: Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
Download Lecture slide
2. Introduction to Ethics
Reference: Chapter 1 : Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
3.Computer and internet crime
Reference: Chapter 3: Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
4. Privacy laws and freedom of Expression
Reference: Chapter4-5 Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
5. Intellectual Property
Reference: Chapter 6: Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
6. Introduction to Global E-Business and collaboration
Reference: Chapter 3: Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
Download lecture slides
7. Software development issues
Reference: Chapter 7:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
8. Social networking and ethical issues
Reference: Chapter 9:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
9. Ethics of IT Organisations
Reference: Chapter 10:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Reference: Chapter 4: Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
Download Lecture slide
2. Introduction to Ethics
Reference: Chapter 1 : Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
3.Computer and internet crime
Reference: Chapter 3: Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
4. Privacy laws and freedom of Expression
Reference: Chapter4-5 Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
5. Intellectual Property
Reference: Chapter 6: Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
Download lecture slides
6. Introduction to Global E-Business and collaboration
Reference: Chapter 3: Kenneth C. Laudon and Jane P. Laudon (2012), Management Information Systems: Managing The Digital Firm. Prentice Hall
Download lecture slides
7. Software development issues
Reference: Chapter 7:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
8. Social networking and ethical issues
Reference: Chapter 9:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.
9. Ethics of IT Organisations
Reference: Chapter 10:Reynolds, G., (2003), Ethics in Information Technology. Thomson Course Technology.