powered by
Center for Curriculum and Transfer Articulation
Ethics in Information Technology
Course: CIS111

First Term: 2014 Fall
Lecture   3 Credit(s)   3 Period(s)   3 Load  
Subject Type: Occupational
Load Formula: S- Standard


Description: Ethical issues that arise as a result of increasing use of computers, and the responsibilities of those who work with computers, either as computer science professionals or end users. Critical inquiry and review of ethical challenges in information technology business, including professional and corporate responsibility, government regulation, fiduciary responsibilities of information, infringement of intellectual property, security risk assessment, Internet crime, identity theft, employee surveillance, privacy, compliance, social networking, and the ethics of IT corporations.



MCCCD Official Course Competencies
1. Describe a variety of different ethical theories. (I)
2. Describe professional business ethics and the complexities of making ethical judgments. (I)
3. Describe issues relating to corporate ownership, corporate governance, and responsiveness to corporate stakeholders. (II)
4. Explain how social media responsibility encompasses economic, legal, ethical, and privacy issues. (II)
5. Explain whistle-blowing and protection for whistle-blowers. (II)
6. Describe the major ethical challenges of operating in a healthcare environment using mobile and wireless technologies. (II)
7. Explain fiduciary responsibilities of private information. (II)
8. Describe issues with software and software liability. (III)
9. Explain cost/benefit analysis in information technology ethical decision-making. (III)
10. Describe the influence of government regulations as well as professional self-regulation and sanctions in ethical information technology decision-making. (IV)
11. Explain intellectual property, copyright laws, and fair use doctrine. (IV)
12. Define hate speech and defamation. (V)
13. Review contemporary issues related to workplace monitoring. (V)
14. Describe the major identity theft issues. (V)
15. Describe Information Technology security breaches and risk assessments. (V)
16. Define security policies within Information Technology. (V)
17. Describe professional codes of ethics for Information Technology professionals. (V)
18. Describe prevention, detection, and responses to Information Technology security attacks. (V)
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements.
 
MCCCD Official Course Outline
I. Ethics and Ethical Theories
   A. Sources of ethical theories
   B. Definition of professional Information Technology ethics
   C. Application of ethical theories to business
II. Corporate and Individual Responsibilities
   A. Responsibilities to shareholders
   B. Responsibilities to stakeholders
   C. Social media responsibility
   D. Healthcare information privacy issues with mobile and wireless technologies
   E. Fiduciary responsibilities concerning private information
   F. Whistle-blower rights and responsibilities
III. Obligations in the Information Technology Profession
   A. Describe liabilities related to software
   B. Give examples of secure coding
   C. Give examples of cost/benefit analysis in information technology ethical decision-making
IV. Decision-Making in Information Technology
   A. Describe the influence of government regulations and professional self-regulation The professional and corporate social audit
   B. Describe intellectual property, copyright laws, and fair use doctrine
V. Application of Ethics to Specific Areas of Information Technology
   A. Explain hate speech and defamation
   B. Explain privacy issues related to workplace monitoring
   C. Give examples of Information Technology security breaches and risk assessments
   D. Define security policies within Information Technology
   E. Describe prevention, detection, and responses to Information Technology security attacks
   F. Describe the major identity theft issues
   G. Describe the professional code of ethics for Information Technology professionals

 
MCCCD Governing Board Approval Date: June 24, 2014

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.