ITMG481 - Ethics in Information Technology
Course Code: ITMG481 Course ID: 4673 Credit Hours: 3 Level: Undergraduate
This course introduces students to issues and controversies that comprise the new field of Cyberethics. The course examines a wide range of ethical issues of moral responsibility towards social and ethical concerns which affect us in our daily lives. Other topics include machine ethics, conceptions of autonomy and trust, responsible innovation, ethical controversies related to ethical computing.
|Registration Dates||Course Dates||Session||Weeks|
|08/26/19 - 01/31/20||02/03/20 - 03/29/20||Winter 2020 Session I||8 Week session|
|09/30/19 - 02/28/20||03/02/20 - 04/26/20||Winter 2020 Session D||8 Week session|
|10/28/19 - 04/03/20||04/06/20 - 05/31/20||Spring 2020 Session B||8 Week session|
|11/25/19 - 05/01/20||05/04/20 - 06/28/20||Spring 2020 Session I||8 Week session|
|12/30/19 - 05/29/20||06/01/20 - 07/26/20||Spring 2020 Session D||8 Week session|
|01/27/20 - 07/03/20||07/06/20 - 08/30/20||Summer 2020 Session B||8 Week session|
|02/24/20 - 07/31/20||08/03/20 - 09/27/20||Summer 2020 Session I||8 Week session|
|03/30/20 - 09/04/20||09/07/20 - 11/01/20||Summer 2020 Session D||8 Week session|
The successful student will fulfill the following learning objectives:
- CO-1: Describe Cyberethics concepts, perspectives, methodological frameworks, and the justification of a moral system
- CO-2: Compare and contrast professional ethics and codes of conduct, and how they induce moral responsibility
- CO-3: Extrapolate the ethical questions that exacerbate technology to extend or curtail the power of individuals
- CO-4: Differentiate ethics used in computer security, hacking methodologies, and privacy practices in the cyberspace
- CO-5: Examine the ethics involved in the development of new technological innovations, online communities and social networks, and aspects of emerging and converging technologies
- CO-6: Discriminate the ethics involved in technological waste production, environmental obligations, and energy resource management
- CO-7: Critique bioethical issues, new cloning technologies, biometric practices, and genetic screening technologies
This course has a strong writing component. The goal is to organize, synthesize, and demonstrate your comprehension of core concepts investigated during this course by applying a combination of the terms, concepts, and details you have learned in a systematic way. As important as "the details" that you analyze and arrange in your writing, however, are the conclusions you draw from those details, and your predictions, responses to, and ultimate interpretation of those details.
- Download the asnWeekxx.doc(x), where xx is the week number, from the Resources section of the classroom. For example, asnWeek01.doc is the filename for week one assignments.
- After downloading the document, open it and enter your answers directly in the document.
- After answering the questions, save and upload the document in Assignments section of the classroom.
- You may work ahead on assignments if you wish.
Assignments are due by Sunday 11:59 p.m. ET of the week in which they are assigned. If you need an extension, please contact me via email to discuss your circumstances
Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals I understand you must manage competing demands on your time. Should you need additional time to complete an assignment please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Assignments submitted late without a prearranged extension will be subject to a late penalty. No late assignments will be accepted after the last day of the course.
Each week a Forum thread will be started for discussion of the week's readings. A specific assignment for posting on the Forum will be announced each week. The assignments may involve discussion or debate. The number of postings required each week will vary and will be announced in the assignment for the week. In most cases you will be required to post at least one original post and one or more follow-ups to your classmates' posts.
Your first post each week must be posted by Wednesday at midnight EST. Please try not to be late with this post because your classmates will be relying on you to post on time to give them a post to respond to later in the week. All follow-up posts must be posted by Sunday at midnight EST.
You will be required to write one term paper this semester. The specifications are as follows:
- You must write a 10-page term paper on a topic of your choice related to computer security or security policies and procedures.
- Your term paper outline is due at the end of week 2.
- Your term paper is due at the end of week 7.
- In addition to the 10 pages of the paper itself, you must include a title page and a references page.
- Your title page must include the title of your paper, the date, the name of this course, your name, and your instructor’s name.
- Your references page must be written in APA citation style Arial 11 or 12-point font or Times New Roman styles.
- You must provide a minimum of five (5) sources throughout the paper.
- Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
- Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
- Papers will be subject to turnitin report generation within the classroom. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A SIGNIFICANT POINT REDUCTION.
- PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.
Quizzes (non-proctored, open-notes)
You may use open notes on the quizzes. Questions may include multiple-choice or true/false. If it occurs in required reading, up to and including the week of the quiz, it is a candidate for inclusion on the quiz. You will be given 45 minutes to complete each quiz.
|Forum #1||4.00 %|
|Forum #2||4.00 %|
|Forum #3||4.00 %|
|Forum #4||4.00 %|
|Forum #5||4.00 %|
|Forum #6||4.00 %|
|Forum #7||4.00 %|
|Forum #8||4.00 %|
|Assignment 1||3.00 %|
|Assignment 2||3.00 %|
|Assignment 3||3.00 %|
|Assignment 4||3.00 %|
|Assignment 5||3.00 %|
|Assignment 6||3.00 %|
|Assignment 7||3.00 %|
|Assignment 8||3.00 %|
|Quiz #1||5.00 %|
|Quiz 1||5.00 %|
|Quiz #2||5.00 %|
|Quiz 2||5.00 %|
|Term Paper||12.00 %|
|Term Paper Topic Selection (Week 2)||1.20 %|
|Term Paper Outline (Week 4)||2.40 %|
|Term Paper (Week 7)||8.40 %|
|Case Study||22.00 %|
|Case Study (Week 8)||22.00 %|
|Book Title:||Ethics and Technology: Controversies, Questions, and Strategies for Ethical Computing, 4th Edition - the VitalSource e-book is provided inside the classroom|
|Author:||Herman T. Tavani|
|Electronic Unit Cost:||$30.00|
Not current for future courses.