Case Study Resources for an Ethics and Computing Course

نویسنده

  • Kevin Bowyer
چکیده

Case studies can be an e ective part of an ethics and computing course. However, it is often time-consuming for the instructor to build a list of good case studies. This is especially true if the instructor wants to use real-life incidents for the cases. Even for the instructor who prefers to use "anonymized" or "synthetic" case studies, a compilation of real incidents provides a good starting point for creating realistic cases. This paper provides brief descriptions of real case study incidents which have been classroom-tested in an undergraduate "ethics and computing" course. Special e ort is made to include incidents with themes that are sometimes given less coverage relative to, for example, hacking or software piracy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Evaluation of the Quality of Entrepreneurship Course Education Services Using SERVQUAL Model (Case Study: Gorgan University of Agricultural Sciences and Natural Resources)

     It is important to pay attention to the quality and applicability of entrepreneurship courses for self-employment of students of agricultural sciences and natural resources in universities. The purpose of this study was to evaluate the quality of entrepreneurship education services provided by students of Gorgan University of Agricultural Sciences and Natural Resources. The statistical pop...

متن کامل

Augmenting the Computing Ethics Course

I describe the evolution of my computing ethics course over a fifteen year period. I itemize and justify my rationales for the resources I have added to supplement a standard computing ethics textbook to meet and exceed the ACM curricula recommendations for a computing ethics course. I argue for prioritizing a substantial teaching focus on the nascent discipline of behavioral ethics.

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue in cloud computing which aims at distributing the load on the different resources of a distribu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997