I. General Information
1. Course Title:
Ethics in Information Technology
2. Course Prefix & Number:
COMP 2160
3. Course Credits and Contact Hours:
Credits: 2
Lecture Hours: 2
4. Course Description:
This course will introduce students to ethical topics and situations that exist in, and are possibly unique to, information technology. Actual case studies will be explored, and students will learn practical advice on how to deal with these issues if they arise. Topics covered will include a definition of ethics, ethics for IT professionals and users, computer crime, internet crime, privacy laws, constitutional freedoms, intellectual property, software development, employment issues, and industry codes of ethics. Career Preparation: The studies in this course will help students prepare for careers such as Computer Support Specialist, PC Repair Technician, Network Administrator, Network Engineer, Systems Analyst, Systems Engineer, IS Manager and CIO.
5. Placement Tests Required:
6. Prerequisite Courses:
COMP 2160 - Ethics in Information Technology
All Credit(s) from the following...
Course Code | Course Title | Credits |
COMP 1109 | Introduction to Operating Systems | 3 cr. |
8. Prerequisite (Entry) Skills:
Efficiency with a current Microsoft operating system such as Windows XP, Windows Vista, Windows 7 or Windows 8.
9. Co-requisite Courses:
COMP 2160 - Ethics in Information Technology
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
University of MN-Duluth, CS 3111 Computer Ethics, 4 credits
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
Program-Applicable Courses – This course is required for the following program(s):
Computer Information Technology, AAS Degree
Computer Support Specialist, Diploma
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Assess alternative solutions to a problem |
Apply troubleshooting theory and an iterative approach to identify a problem, determine the cause, apply a solution, and then implement preventative measures. |
Utilize appropriate technology |
Use current computer hardware and software to explore common unethical practices in the field of IT. |
Apply ethical principles in decision-making |
Identify both ethical and unethical solutions to real-world situations and problems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Distinguish between ethical and unethical behavior.
- Express general ethical theories as they apply to information technology.
- Criticize the pro and con arguments used in computer crime issues.
- Identify the risks associated with unethical behavior in the IT field.
- Identify the negative impact that unethical behavior can have and its consequences.
- Evaluate an organization's IT ethics policy.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Overview of ethics
- Definition of ethics
- Why fostering good business ethics is important
- Creating an ethical work environment
- Making ethical decisions
- Ethics for IT professionals
- Expectations of the IT industry
- Professional codes of ethics
- Government licensing
- IT professional malpractice
- Ethical issues for IT users
- Computer and Internet Crime
- IT security incidents
- Types of exploits
- Types of criminals
- Performing a risk assessment
- Risk management
- Prevention
- Detection
- Privacy
- Privacy laws
- Information and data privacy
- Anonymity and privacy issues
- Identity theft
- Consumer profiling
- Freedom of expression
- First amendment rights
- Controlling access to information on the Internet
- Anonymity and freedom of expression
- Pornography
- Defamation, libel and hate
- Intellectual property
- Copyrights
- Patents
- Trade secrets
- Reverse engineering
- Plagiarism
- Open source code, freeware and shareware
- Competitive intelligence
- Social networking
- Business application of social networking
- Hiring practices
- Cyber-bullying, cyber-stalking, predation and other social crimes
- Virtual worlds
- Ethics of IT organizations
- Contingent workers
- H-1B workers
- Whistle-blowing
- Outsourcing
- Green computing
- Ethical policies
I. General Information
1. Course Title:
Ethics in Information Technology
2. Course Prefix & Number:
COMP 2160
3. Course Credits and Contact Hours:
Credits: 2
Lecture Hours: 2
4. Course Description:
This course will introduce students to ethical topics and situations that exist in, and are possibly unique to, information technology. Actual case studies will be explored, and students will learn practical advice on how to deal with these issues if they arise. Topics covered will include a definition of ethics, ethics for IT professionals and users, computer crime, internet crime, privacy laws, constitutional freedoms, intellectual property, software development, employment issues, and industry codes of ethics. Career Preparation: The studies in this course will help students prepare for careers such as Computer Support Specialist, PC Repair Technician, Network Administrator, Network Engineer, Systems Analyst, Systems Engineer, IS Manager and CIO.
5. Placement Tests Required:
6. Prerequisite Courses:
COMP 2160 - Ethics in Information Technology
All Credit(s) from the following...
Course Code | Course Title | Credits |
COMP 1109 | Introduction to Operating Systems | 3 cr. |
8. Prerequisite (Entry) Skills:
Efficiency with a current Microsoft operating system such as Windows XP, Windows Vista, Windows 7 or Windows 8.
9. Co-requisite Courses:
COMP 2160 - Ethics in Information Technology
There are no corequisites for this course.
II. Transfer and Articulation
1. Course Equivalency - similar course from other regional institutions:
University of MN-Duluth, CS 3111 Computer Ethics, 4 credits
3. Prior Learning - the following prior learning methods are acceptable for this course:
- Written
- Oral
- Demonstration
- Portfolio
III. Course Purpose
1. Program-Applicable Courses – This course is required for the following program(s):
Computer Information Technology, AAS Degree
Computer Support Specialist, Diploma
IV. Learning Outcomes
1. College-Wide Outcomes
College-Wide Outcomes/Competencies |
Students will be able to: |
Utilize appropriate technology |
Use current computer hardware and software to explore common unethical practices in the field of IT. |
Apply ethical principles in decision-making |
Identify both ethical and unethical solutions to real-world situations and problems. |
2. Course Specific Outcomes - Students will be able to achieve the following measurable goals upon completion of
the course:
- Distinguish between ethical and unethical behavior.
- Express general ethical theories as they apply to information technology.
- Criticize the pro and con arguments used in computer crime issues.
- Identify the risks associated with unethical behavior in the IT field.
- Identify the negative impact that unethical behavior can have and its consequences.
- Evaluate an organization's IT ethics policy.
V. Topical Outline
Listed below are major areas of content typically covered in this course.
1. Lecture Sessions
- Overview of ethics
- Definition of ethics
- Why fostering good business ethics is important
- Creating an ethical work environment
- Making ethical decisions
- Ethics for IT professionals
- Expectations of the IT industry
- Professional codes of ethics
- Government licensing
- IT professional malpractice
- Ethical issues for IT users
- Computer and Internet Crime
- IT security incidents
- Types of exploits
- Types of criminals
- Performing a risk assessment
- Risk management
- Prevention
- Detection
- Privacy
- Privacy laws
- Information and data privacy
- Anonymity and privacy issues
- Identity theft
- Consumer profiling
- Freedom of expression
- First amendment rights
- Controlling access to information on the Internet
- Anonymity and freedom of expression
- Pornography
- Defamation, libel and hate
- Intellectual property
- Copyrights
- Patents
- Trade secrets
- Reverse engineering
- Plagiarism
- Open source code, freeware and shareware
- Competitive intelligence
- Social networking
- Business application of social networking
- Hiring practices
- Cyber-bullying, cyber-stalking, predation and other social crimes
- Virtual worlds
- Ethics of IT organizations
- Contingent workers
- H-1B workers
- Whistle-blowing
- Outsourcing
- Green computing
- Ethical policies