You are here
Professional Conduct and Computer Ethics
This introductory tutorial will start by examining some of the ethical responsibilities that come along with access to other users' data, accounts, and confidential information. We will look at several case studies involving both local and Cloud usage. All attendees are strongly encouraged to participate in the discussion. Numerous viewpoints will be considered in order to give students a perspective from which to develop their own reasoned response to ethical challenges.
The answers to these and other problems are often far more complicated than one would initially guess.
There are no prerequisites for this class.
People in any of the following situations would benefit from this tutorial:
- system administrators
- managers of system administrators
- those who have access to personal/confidential information
- those who make policy decisions about computer systems and their users.
After completing this tutorial, students will be better able to resolve questionable situations and will have the means to support their decisions.
- Why it is important to set your ethical standards before issues arise
- Who is impacted by "expectations of ethical conduct"
- Why this isn't just an expectation of system administrators
- Implicit expectations of ethical behavior
- Ethics and the Cloud
- Coercion to violate ethics
- Well-intentioned violations of privacy
- Collection, retention, and protection of personal data
- Management directives vs. friendships
- Software piracy/copying in a company/group/department