1 / 19

An MBA Course in Ethics, Privacy and Security

Explore the ethical implications of privacy and security in the context of business and computing. This course covers the history of computer ethics, various approaches to ethics, and topics such as privacy, identity theft, security threats, and more.

mistih
Télécharger la présentation

An MBA Course in Ethics, Privacy and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems

  2. Background • Ethics at Xavier • A major part of strategic plan • New Center for Business Ethics • Movement to integrate ethics into curriculum • Ethics in Business / Computing • Obviously, major focus in recent business news • Increasingly important subject in computing

  3. History of Computer Ethics • Dates to post WWII era • “social potentiality of unheard–of importance for good and for evil.” • 1960s and 70s • Impact of computers on society recognized but few inroads into academics • 1973: first ACM code of ethics • 1985: “Computer Ethics” first major textbook • 1980s to present – numerous courses, research centers, conferences, journals, etc. on topic

  4. Computer Ethics in Academia • Evolved from many different subject areas • Philosophy, Computer Science, Communications, Law, Information Systems, Telecommunications, and others • Wide range of approaches and content • Inconsistent content even within discipline • Examples: ISWorld sample syllabus vs. NC State content

  5. PHILOSOPHY Define ethics and how it fits into philosophical thought. Describe the fields of philosophy: Metaphysics, epistemology, value theory, aesthetics, logic. Define "second order" inquiries in the field of philosophy. Define the terms "rational" and "critical" as they concern philosophical thought. Contrast the speculative and analytic approaches to philosophy. Compare and contrast science and philosophy. Compare and contrast "idealism” and “materialism” MORALITY Define "morality". Explain the following challenges to Morality: 1. Logical positivism. 2. Relativism. 3. Existentialism. 4. Determinism. Define Teleology. Compare and contrast the teleological viewpoints of hedonism and utilitarianism. Define Deontology. Compare and contrast teleological and deontological ethical CyberEthics: Miss. State

  6. Ethics in Computing: NC State

  7. Computer Ethics Teaching Resources • Several Textbooks… however: • Some outdated • Collections of articles • Not oriented toward business students • Many web sites, articles, etc. • Need for better course materials, consistency of ethics content across courses within disciplines

  8. Course Profile: MBA Course in Ethics, Privacy & Security

  9. Ethics has no place in a business school. Ethics is for fools and babies. Money is the only measure of business success. - Business School Dean

  10. Buckman Laboratories • Founder’s Attitude toward ethics • Credits Code of Ethics with KM Implementation Success

  11. Rationale • HIPAA as a model • Of the future of IT • Of an application with direct human affect • Of the need for interaction between Ethics, Privacy and Security

  12. As long as I’m not breaking the law, I don’t care who sees my information – I have nothing to be afraid of. -MBA Student(s) Area for further research

  13. Privacy • As a personal issue • As a legal issue • Include constitutional discussion • As an IT issue • As an ethical issue

  14. Other Ethical Issues • Identity Theft • Disinformation and Misinformation • VR • AI • Equity of Access • Games, Violence, Sex and Behavior Modeling • Government and Legal • Medical and Scientific Impact • Send e-mail for list of resources

  15. Security • Threats • Hackers • Viruses • Trojans • DOS attacks • attack techniques • Defenses • Encryption • Virus detection • Biometrics • Intrusion Detection • Firewalls

  16. Pedagogy • Instructor Presentations • Contemporary Readings • Individual Research and Presentations • Professional Guest Speakers • Resources

  17. Conclusion • A changing topic • Courses vary widely • A review and a new idea • Unlikely to develop a comprehensive set of topics • Area could use further definition and organization • Further research into pedagogical approaches is needed.

  18. Invitation • Who is offering (a) course(s) in IT Ethics • Who is offering (a) course(s) in EPS • Who is interested in offering (a) course(s) in IT Ethics or EPS • Topics, pedagogy, results • krogerd@xu.edu • sena@xu.edu

  19. Questions?

More Related