16.01.2015 Views

CS2013-final-report

CS2013-final-report

CS2013-final-report

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ethical decision making is an inductive thought process that is not routinely taught in any normative educational<br />

area. This class, which exists on the cutting edge of technological advance, equips the student to think outside the<br />

box and apply the new rubric of ethical deliberation to the expanding world of the cyber-arena. The course equips<br />

students majoring in Cyberforensics and Cybersecurity to apply practical knowledge to the monumental challenges<br />

they will face in their careers as the world of the cyber-arena becomes more and more pervasive and invasive.<br />

When developing this course, we looked at requiring a philosophical ethics class that would count as a general<br />

education requirement in the humanities. But the issue we had is that the cases in that course would be divorced<br />

from the situations faced by information system security professionals. We wanted the cases to be those that would<br />

fit in with our curriculum. In addition, there was not room in our program to have two courses, so we decided to<br />

develop one that would count as a general education ethics course and present ethical theory as the basis for<br />

examining cases.<br />

We looked at many computer/cyber ethics textbooks and discovered that most of them only provided a cursory<br />

overview of ethical theory, if any. This was not enough to warrant classification under general education. We also<br />

did not want to require two textbooks because we are mindful of textbook costs for our students. We then found<br />

Herman T. Tavani’s text that covered ethical theory in depth and provided the practical cases in the field of<br />

computer ethics.<br />

Body of Knowledge coverage<br />

KA Knowledge Unit Topics Covered Hours<br />

SP Social Context Social Justice<br />

6<br />

Digital divide<br />

Distributive justice theories<br />

Accessibility issues<br />

Social interaction<br />

Cultural issues<br />

Commerce, Free Speech and Censorship<br />

Define the Internet as public or private space<br />

Regulatory agencies and laws regarding regulation in physical space<br />

Jurisdictional issues with regulating cyberspace<br />

Free speech and hate speech<br />

Free speech and pornography<br />

SP Analytical Tools Introduction to Ethical Thought – values, morals, normative analysis 12<br />

Introduction to Cyberethics<br />

Ethical theories – Virtue Ethics, Utilitarianism, Deontology, Just<br />

Consequentialism, Social Contract Theory<br />

Evaluate stakeholder positions<br />

Concepts of argumentation and debate<br />

SP Professional Ethics Moral responsibility of a professional<br />

Pervasive nature of computing applies to all, not only professionals<br />

Professional Codes of Conduct<br />

Principles of the Joint IEEE-CS/ACM Code of Ethics and<br />

Professional Practice<br />

Purpose of a code of ethics<br />

Weaknesses of codes of ethics<br />

Accountability, responsibility and liability<br />

4<br />

- 434 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!