Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration
    • Discounts
    • Venue, Hotel, and Travel
    • Why Attend?
    • Students and Grants
  • Program
    • Program at a Glance
    • Conference Program
    • Training Program
      • Training Program - Details
    • Workshops
    • Conference Topics
      • Systems and Network Engineering
      • Monitoring and Metrics
      • SRE and Software Engineering
      • Culture
    • UCMS '15
    • URES '15
    • Puppet Camp DC
  • Activities
    • Birds-of-a-Feather
    • LISA Build
    • LISA Lab
  • Sponsors and Expo
    • LISA15 Expo
    • Sponsor and Exhibitor List
    • Exhibitor Services
  • Participate
    • Call for Participation
    • Call for Research Papers and Posters
      • Submitting Papers and Posters
    • Speaker Resources
  • About
    • Conference Organizers
    • Help Promote
    • Services
    • Code of Conduct
    • Past Conferences

help promote

LISA16 CFP button

Get more
Help Promote graphics!

twitter

Tweets by @LISAConference

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home ยป Professional Conduct and Computer Ethics
Tweet

connect with us

Professional Conduct and Computer Ethics

Half Day Morning
(9:00 am-12:30 pm)

Lincoln 4

LISA15: Culture
S5
Lee Damon, University of Washington
Description: 

This introductory tutorial will start by examining some of the ethical responsibilities that come along with access to other users' data, accounts, and confidential information. We will look at several case studies involving both local and Cloud usage. All attendees are strongly encouraged to participate in the discussion. Numerous viewpoints will be considered in order to give students a perspective from which to develop their own reasoned response to ethical challenges.

The answers to these and other problems are often far more complicated than one would initially guess.

There are no prerequisites for this class.

Who should attend: 

People in any of the following situations would benefit from this tutorial:

  • system administrators
  • managers of system administrators
  • those who have access to personal/confidential information
  • those who make policy decisions about computer systems and their users.

Take back to work: 

After completing this tutorial, students will be better able to resolve questionable situations and will have the means to support their decisions.

Topics include: 
  • Why it is important to set your ethical standards before issues arise
  • Who is impacted by "expectations of ethical conduct"
  • Why this isn't just an expectation of system administrators
  • Implicit expectations of ethical behavior
  • Ethics and the Cloud
  • Coercion to violate ethics
  • Well-intentioned violations of privacy
  • Collection, retention, and protection of personal data
  • Management directives vs. friendships
  • Software piracy/copying in a company/group/department
Presentation Type: 
Training

© USENIX

LISA is a registered trademark of the USENIX Association.

  • Privacy Policy
  • Contact Us