An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of...
-
Upload
mildred-judith-jefferson -
Category
Documents
-
view
212 -
download
0
Transcript of An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of...
![Page 1: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/1.jpg)
An MBA Course in An MBA Course in Ethics, Privacy and Ethics, Privacy and
SecuritySecurity
David KrogerDavid KrogerMark SenaMark Sena
Xavier UniversityXavier UniversityDepartment of Information Department of Information
SystemsSystems
![Page 2: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/2.jpg)
BackgroundBackground
Ethics at XavierEthics at Xavier• A major part of strategic planA major part of strategic plan• New Center for Business EthicsNew Center for Business Ethics• Movement to integrate ethics into Movement to integrate ethics into
curriculumcurriculum Ethics in Business / ComputingEthics in Business / Computing
• Obviously, major focus in recent business Obviously, major focus in recent business newsnews
• Increasingly important subject in computingIncreasingly important subject in computing
![Page 3: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/3.jpg)
History of Computer EthicsHistory of Computer Ethics
Dates to post WWII eraDates to post WWII era• ““social potentiality of unheard–of importance for social potentiality of unheard–of importance for
good and for evil.”good and for evil.” 1960s and 70s1960s and 70s
• Impact of computers on society recognized but Impact of computers on society recognized but few inroads into academicsfew inroads into academics
1973: first ACM code of ethics1973: first ACM code of ethics 1985: “Computer Ethics” first major textbook1985: “Computer Ethics” first major textbook 1980s to present – numerous courses, 1980s to present – numerous courses,
research centers, conferences, journals, etc. research centers, conferences, journals, etc. on topic on topic
![Page 4: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/4.jpg)
Computer Ethics in AcademiaComputer Ethics in Academia
Evolved from many different subject areasEvolved from many different subject areas• Philosophy, Computer Science, Philosophy, Computer Science,
Communications, Law, Information Communications, Law, Information Systems, Telecommunications, and Systems, Telecommunications, and othersothers
Wide range of approaches and contentWide range of approaches and content Inconsistent content even within disciplineInconsistent content even within discipline
• Examples: ISWorld sample syllabus vs. Examples: ISWorld sample syllabus vs. NC State contentNC State content
![Page 5: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/5.jpg)
CyberEthics: Miss. StateCyberEthics: Miss. StatePHILOSOPHYPHILOSOPHY Define ethics and how it fits into Define ethics and how it fits into
philosophical thought. philosophical thought. Describe the fields of Describe the fields of
philosophy: philosophy: • Metaphysics, epistemology, Metaphysics, epistemology,
value theory, aesthetics, value theory, aesthetics, logic. logic.
Define "second order" inquiries Define "second order" inquiries in the field of philosophy. in the field of philosophy.
Define the terms "rational" and Define the terms "rational" and "critical" as they concern "critical" as they concern philosophical thought. philosophical thought.
Contrast the speculative and Contrast the speculative and analytic approaches to analytic approaches to philosophy. philosophy.
Compare and contrast science Compare and contrast science and philosophy. and philosophy.
Compare and contrast Compare and contrast "idealism” and “materialism”"idealism” and “materialism”
MORALITYMORALITY Define "morality". Define "morality". Explain the following Explain the following
challenges to Morality: challenges to Morality: • 1. Logical positivism. 1. Logical positivism. • 2. Relativism. 2. Relativism. • 3. Existentialism. 3. Existentialism. • 4. Determinism.4. Determinism.
Define Teleology. Define Teleology. Compare and contrast the Compare and contrast the
teleological viewpoints of teleological viewpoints of hedonism and utilitarianism. hedonism and utilitarianism.
Define Deontology.Define Deontology. Compare and contrast Compare and contrast
teleological and deontological teleological and deontological ethicalethical
![Page 6: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/6.jpg)
Ethics in Computing: NC StateEthics in Computing: NC State
![Page 7: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/7.jpg)
Computer Ethics Teaching Computer Ethics Teaching ResourcesResources
Several Textbooks… however:Several Textbooks… however:• Some outdatedSome outdated• Collections of articlesCollections of articles• Not oriented toward business studentsNot oriented toward business students
Many web sites, articles, etc.Many web sites, articles, etc. Need for better course materials, Need for better course materials,
consistency of ethics content across consistency of ethics content across courses within disciplinescourses within disciplines
![Page 8: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/8.jpg)
Course Profile: MBA Course Profile: MBA Course in Ethics, Privacy & Course in Ethics, Privacy &
SecuritySecurity
![Page 9: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/9.jpg)
Ethics has no place in a business Ethics has no place in a business school. Ethics is for fools and babies. school. Ethics is for fools and babies. Money is the only measure of Money is the only measure of business success.business success.
- Business School - Business School DeanDean
![Page 10: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/10.jpg)
Buckman LaboratoriesBuckman Laboratories
• Founder’s Attitude toward ethicsFounder’s Attitude toward ethics
• Credits Code of Ethics with KM Credits Code of Ethics with KM Implementation SuccessImplementation Success
![Page 11: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/11.jpg)
RationaleRationale
HIPAA as a modelHIPAA as a model• Of the future of ITOf the future of IT
• Of an application with direct human Of an application with direct human affectaffect
• Of the need for interaction between Of the need for interaction between Ethics, Privacy and SecurityEthics, Privacy and Security
![Page 12: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/12.jpg)
As long as I’m not breaking the law, I As long as I’m not breaking the law, I don’t care who sees my information – don’t care who sees my information – I have nothing to be afraid of.I have nothing to be afraid of.
-MBA Student(s)-MBA Student(s)
Area for further researchArea for further research
![Page 13: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/13.jpg)
PrivacyPrivacy
As a personal issueAs a personal issue
As a legal issueAs a legal issue• Include constitutional discussionInclude constitutional discussion
As an IT issueAs an IT issue
As an ethical issueAs an ethical issue
![Page 14: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/14.jpg)
Other Ethical IssuesOther Ethical Issues Identity TheftIdentity Theft Disinformation and MisinformationDisinformation and Misinformation VRVR AIAI Equity of AccessEquity of Access Games, Violence, Sex and Behavior Games, Violence, Sex and Behavior
ModelingModeling Government and LegalGovernment and Legal Medical and Scientific ImpactMedical and Scientific Impact
• Send e-mail for list of resourcesSend e-mail for list of resources
![Page 15: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/15.jpg)
SecuritySecurity ThreatsThreats
• HackersHackers• VirusesViruses• TrojansTrojans• DOS attacksDOS attacks• attack techniquesattack techniques
Defenses Defenses • EncryptionEncryption• Virus detection Virus detection • BiometricsBiometrics• Intrusion DetectionIntrusion Detection• FirewallsFirewalls
![Page 16: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/16.jpg)
PedagogyPedagogy
Instructor PresentationsInstructor Presentations
Contemporary ReadingsContemporary Readings
Individual Research and PresentationsIndividual Research and Presentations
Professional Guest SpeakersProfessional Guest Speakers
ResourcesResources
![Page 17: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/17.jpg)
ConclusionConclusion
A changing topicA changing topic Courses vary widelyCourses vary widely A review and a new ideaA review and a new idea Unlikely to develop a comprehensive Unlikely to develop a comprehensive
set of topicsset of topics Area could use further definition and Area could use further definition and
organizationorganization Further research into pedagogical Further research into pedagogical
approaches is needed.approaches is needed.
![Page 18: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/18.jpg)
InvitationInvitation
Who is offering (a) course(s) in IT Who is offering (a) course(s) in IT EthicsEthics
Who is offering (a) course(s) in EPSWho is offering (a) course(s) in EPS Who is interested in offering (a) Who is interested in offering (a)
course(s) in IT Ethics or EPScourse(s) in IT Ethics or EPS Topics, pedagogy, resultsTopics, pedagogy, results
[email protected]@xu.edu [email protected]@xu.edu
![Page 19: An MBA Course in Ethics, Privacy and Security David Kroger Mark Sena Xavier University Department of Information Systems.](https://reader036.fdocuments.net/reader036/viewer/2022072015/56649eb75503460f94bc0f99/html5/thumbnails/19.jpg)
Questions?Questions?