Sunday 21 June 2009

Sharing Assignment Material...

Please share any material that you find when doing individual and group research into the various topics concerning your assignments that you think may be useful to your colleagues.

To start you off...
Could be useful for the group assignmentBiometric Fingerprint Security System at Heathrow:
Announcement:http://www.computerweekly.com/Articles/2008/03/26/230008/baa-suspends-fingerprint-biometrics-security-system-at-heathrow-terminal.htm

Blog discussing the issues:http://www.computerweekly.com/blogs/the-data-trust-blog/2008/03/the-cost-of-privacy-biometrics.html

Discussion Two: Ethical Issues - Privacy

Food for thought...
There are many ethical issues that arise concerning Privacy. Where continuous innovation of technology is concerned there will always be 'ethical dilemmas' that arise as technological evolution focus more on functionalities rather than anticipated human behaviour and uses.

One example of such innovation is...''There are serious ethical issues in the use of biometric technology. The main issues concern the personal privacy, the conflict with one’s beliefs and values and the collection, protection and use of personal biometric data. The civil liberty organisations argue that the technology undermines the human rights for privacy and anonymity. It is intrusive and has the capability to make serious impact on personal freedom and democratic rights. The technology is prone to failure and is not fake proof as it can be spoofed''.
Source: www.bcs.org/upload/pdf/ashaikh.pdf

Should the use of biometrics be encouraged? Do you think biometrics aid in preventing crime? Source: http://www.comptechlib.com/biometric-fingerprint.htm

What are the ethical issues surrounding the use of biometric technology? Maybe 'personal' privacy issues come to the fore here where some may believe that the technology undermines the human rights for privacy and anonymity. What are your thoughts on this?

Discussion 1: AUP policies...Is there such thing as an Internet User Policy?

Hi All,
This is for discussion of IT (AUP) policies for the assignment. I have included a 'starter' question for you, feel free to add new threads!

Powerful tools require careful management, they always have. The same power and force that makes a tool so effective can, in a single moment of inattention, quickly transform the tool from an implement of construction into a device of destruction. The maxim holds true whether the subject is a contractor - grade 7 - 1/4-inch circular saw or the Internet.

The same capacities and dynamism that make the Internet such a profound business tool also render it a potentially dangerous diversion. Used improperly, the Internet can subject every organisation to harassment claims, countless hours lost productivity and innumerable security leaks and vulnerabilities.

What are your views? Please read the rest of the article and let us know what you think!!
Link:
http://news.zdnet.co.uk/security/0,1000000189,39283155,00.htm

Saturday 13 June 2009

Task 2 Reflection: Computer Crime: The ethical issues surrounding hackers and hacking

Task Two:

Working in your groups produce a short account (1 A4 page) expressing your ideas concerning computer crime relating to hackers and hacking and the ethical issues surrounding this issue.

Tuesday 9 June 2009

Task One: The Political Compass

The Political Compass
To get you started your first task is to take the test presented on the Political Compass site and get your own reading. Then post your reading and your views on the site on the module blog. The test will hopefully open up debate and interesting conversations...

My political compass result is: Economic Left/Right: 1.00 and Social Libertarian/Authoritarian: 0.67 - An engaging, stimulating and interesting site. I have learned something about myself that I was unaware of.

To take the test Click Here

Sunday 7 June 2009

Assignments...

There is one individual assignment and one group assignment for this module. The individual assignment is an essay and is worth 70% of the module grade. The group assignment is worth 30% of the module grade and requires you to develop organisational policies, and to contribute to the discussion boards on the module blog. Full details will be issued as per the schedule.

Saturday 6 June 2009

PIIT Module Description...

Aims of Module: It is imperative that computing/IS professionals have an understanding of the societal, professional, ethical and legal issues arising from the use and development of technology. The aim of this module is to relate the theoretical and practical work of the other modules to the work of the computing/information systems professional by introducing students to the concepts of computer ethics, professional responsibilities and IT law. This module will be an interactive learning experience with lively debates and discussions of current and topical events.

Syllabus Outline: Introduction to the concepts of computer ethics and professional responsibility; Skills for Ethical Analysis; Main ethical models; Relativism, Utilitarianism; Deontological theories; Requirements for Professional Ethics; Is computing a profession?; Models of professional relationships; Codes of Ethics (ACM, BCS, IFIP); Legal issues; Computer Crime; Intellectual Property; Law and the Internet; Data Protection; Hacking and Viruses; History of Hacking; Hacker Ethics; Legislation and legal cases; Privacy: Why is privacy important?; Computer Surveillance; Problems with Networked Communication; Privacy Legislation; Summary of Ethical and Professional Issues; Summary of required skills; Summary of Legislation and legislative Problems.
The full module specification is available on Blackboard VLE.