II.
Course Code :
ACT 113
III.
Course Description : This course will cover ethical issues
regarding legal, privacy and intellectual property rights concerns and their
application to information technology. It will give an overview of the subject
aimed at raising students’ awareness about ethics in Information Technology and
in research. It will include case studies to target specific IT fields such as
ethics in business and in the workplace.
IV.
Course Credit : 3 units lecture
V.
Contact Hours/Semester :
54 lecture hours
VI.
Placement :
1st Year, 1st Semester
VII. Course
Objectives : At the end of this course,
students shall
be able to:
1.
Describe
and evaluate consequences of computing on individuals, organizations and
society;
2.
Critically
analyze situations of computer use and technology and policy proposals and
3.
Discuss
philosophical frameworks of ethics.
VIII. COURSE
REQUIREMENTS
A.
Written
Requirements
1.
Compilation
of class activities
2.
Learning
log
IX.
TEACHING METHODOLOGIES
1.
Lecture
Discussion
2.
Group
Dynamics
X.
EVALUATION PARAMETERS
1.
Classroom
1.1 Class Standing ---------------------------------------------------------2/3
1.1.1
Quizzes
--------------------------------------------90%
1.1.2
Group
Work and other activities-------------10%
1.2 Long Term
Examination-----------------------------------------------1/3
Final MG
: PL+TMG/2=FMG
Final Term Grade : FMG+TFG/2
XI.
Course Outline
Lesson No.
|
Topic/Content
|
Time Frame/
No. of Hours
|
Lesson
1
Lesson
2
Lesson
3
Lesson
4
Lesson
5
Lesson
6
Lesson
7
Lesson
8
|
Prelim
I.
Ethics
A.
What
is Ethics
1. Definition
2. The Importance of Integrity
B. Ethics in the Business World
1.
Why Fostering Good Business Ethics is
Important
2.Improving Corporate Ethics
3.When Good Ethics Result in Short
Term Losses
4.Creating an Ethical Work Environment
5.Ethical Decision Making
C.Ethics in Information Technology
II.
Ethics for IT Professionals and IT Users
A.
IT Professionals
B.
The Ethical Behavior of IT Professionals
C.
Ethical Professional Malpractice
D. IT Users
III.
Computer and Internet Crime
A.
IT Security Incidents: A Worsening Problem
B.
Reducing Vulnerabilities
|
1
2
1
1
1
1
1
2
3.5
|
Lesson
9
Lesson
10
Lesson
11
Lesson
12
Lesson
13
Lesson
14
Lesson
15
Lesson
16
Lesson
17
Lesson
18
Lesson
19
Lesson
20
Lesson
21
Lesson
22
|
Midterm
I.
Privacy
A. Privacy Protection and the Law
B. Key Privacy and Anonymity Issues
1.
Governmental
Electronic Surveillance
2.
Data Encryption
3.
Identity Theft
4.
Consumer Profiling
5.
Treating Consumer
Data Responsibly
6.
Workplace
Monitoring
7.
Spamming
8.
Advanced
Surveillance Technology
II.
Freedom of Expression
A.
Freedom of
Expression: Key Issues
1.
Controlling Access
to Information on the Internet
2.
Anonymity
3.
National Security
Letters
4.
Defamation and Hate
Speech
5.
Pornography
|
1
1
1
1
1
1
1
1
1
1
1
1
1
1.5
|
Lesson
23
Lesson
24
Lesson
25
Lesson
26
Lesson
27
Lesson
28
Lesson
29
Lesson
30
|
Semi
Final
III.
Intellectual Property
A. Definition
1.
Copyrights
2.
Patents
3.
Trade Secret Laws
B. Key Intellectual Property Issues
1.Plagiarism
2.Reverse Engineering
3.Open Source Code
4.Competitive Intelligence
5. Cybersquatting
IV.
Software Development
A.
Strategies to
Engineer Quality Software
B.
Key Issues in
Software Development
|
1
1
1
1
1
1
3.5
3.5
|
Lesson
31
Lesson
32
Lesson
33
Lesson
34
Lesson
35
Lesson
36
|
Final
V.
Employer/Employee Issues
A.
Use
of Non Traditional Workers
1.
Contingent
Workers
2.
H-1B
Workers
3.
Offshore
Outsourcing
B.
Whistle-Blowing
VI.
The Impact of Information Technology on the
Quality of Life
A.
The
Impact of IT on the Standard of Living and Productivity
B.
The
Impact of IT on Healthcare Costs
1.
Electronic
Health Records
2.
Use
of Mobile and Wireless Technology
3.
Telemedicine
|
2
2
2
2
2
3.5
|
REFERENCES
|
: Books
Reynolds, G. (2009). Ethics
in Information Technology.
Philippines: MG Reprographics, Inc.
|
|
REMINDERS:
1.
Submission
of all course requirements should be on time.
2.
Complete
attendance is a must.
Prepared by:
CENDRYL F. MOLINA
No comments:
Post a Comment