MC4002 Professional Ethics in IT Syllabus:

MC4002 Professional Ethics in IT Syllabus – Anna University PG Syllabus Regulation 2021

COURSE OBJECTIVES:

 To understand the concepts of computer ethics in the work environment.
 To understand the threats in computing environment
 To Understand the intricacies of accessibility issues
 To ensure safe exits when designing the software projects

UNIT I INTRODUCTION TO ETHICS

Definition of Ethics- Right, Good, Just- The Rational Basis of Ethics -Theories of Right: Intuitionist vs. End-Based vs. Duty-Based -Rights, Duties, Obligations -Theory of Value – Conflicting Principles and Priorities -The Importance of Integrity -The Difference Between Morals, Ethics, and Laws -Ethics in the Business World – Corporate Social Responsibility – Creating an Ethical Work Environment -Including Ethical Considerations in Decision Making

UNIT II ETHICS IN INFORMATION TECHNOLOGY, INTERNET CRIME

IT Professionals – Are IT Workers Professionals- Professional Relationships That Must Be Managed -Professional Codes of Ethics – Professional Organizations – Certification – IT Professional Ethics, Three Codes of Ethics, Management Conflicts. The Reveton Ransomware Attacks -IT Security Incidents: A Major Concern – Why Computer Incidents Are So Prevalent – Types of Exploits -Types of Perpetrators-Federal Laws for Prosecuting Computer Attacks Implementing Trustworthy Computing -Risk Assessment -Establishing a Security Policy – Educating Employees and Contract Workers

UNIT III FREEDOM OF EXPRESSION, PRIVACY

First Amendment Rights -Obscene Speech-Defamation -Freedom of Expression: Key Issues – Controlling Access to Information on the Internet -Strategic Lawsuit Against Public Participation (SLAPP)-Anonymity on the Internet-Hate Speech- Privacy Protection and the Law- Information Privacy- Privacy Laws, Applications, and Court Rulings-Key Privacy and Anonymity Issues Data Breaches -Electronic Discovery-Consumer Profiling- Workplace Monitoring -Advanced Surveillance Technology

UNIT IV FREEDOM OF EXPRESSION, INTELLECTUAL PROPERTY RIGHTS

Intellectual Property Rights-Copyrights-Copyright Term – Eligible Works -Fair Use Doctrine – Software Copyright Protection –Copyright Laws and the internet-Copyright and Piracy–Patents- -Software Patents -Cross-Licensing Agreements -Trade Secrets-Trade Secret Laws -Employees and Trade Secrets-Key Intellectual Property Issues-Plagiarism -Reverse Engineering-Open Source Code- Competitive Intelligence -Trademark Infringement -Cyber squatting

UNIT V SOCIAL NETWORKING ETHICS AND ETIQUETTES

Social Networking Web Site- Business Applications of Online Social Networking-Social Network Advertising-The Use of Social Networks in the Hiring Process-Social Networking Ethical Issues –Cyber bullying- Online Virtual Worlds-Crime in Virtual Worlds-Educational and Business Uses of Virtual Worlds

SUGGESTED ACTIVITIES:

1. Prepare a report of CSR activities of any three organizations.
2. Study of the government rules and regulations for prosecuting Computer Attacks
3. Do case study of two incidents that lead to IT Security breach in any of the organizations
4. Recent cases ( within last 5 years duration) of infringement of intellectual property rights
5. A study on Creative commons and its effect on Open Educational Resources
6. A study on the role of social networking advertising in the development of Business and Educational Sectors

TOTAL:45 PERIODS

COURSE OUTCOMES:

Upon Completion of the course, the students will be able to
CO1: Examine situations and to internalize the need for applying ethical principles, values to tackle various situations.
CO2: Develop a responsible attitude towards the use of computers as well as the technology.
CO3: Envision the societal impact on the products/ projects they develop in their career
CO4: Understand the code of ethics and standards of computer professionals.
CO5: Analyze professional responsibility and empower access to information in the workplace.

REFERENCES

1. Caroline Whitback, ”Ethics in Engineering Practice and Research“, Cambridge University Press, 2nd Edition 2011.
2. George Reynolds, “Ethics in Information Technology”, Cengage Learning, 6thEdition 2018.
3. Barger, Robert. (2008). Computer ethics: A case-based approach.Cambridge University Press 1stEdition.
4. John Weckert and Douglas Adeney, Computer and Information Ethics, Greenwood Press,FirstEdition1997.
5. Penny Duquenoy, Simon Jones and Barry G Blundell, “Ethical, legal and professional issues in computing”, Middlesex University Press, First Edition2008.
6. Sara Baase, “A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology”, 4th Edition, Pearson India, 2018.
7. http://www.infosectoday.com/Articles/Intro_Computer_Ethics.html