Module Special Admissions Requirements
The typical student should have some experience of employment in an IT role.
Only available for students on FCET Negotiated Undergradute awards
Module Resources
PC with internet access
Blackboard VLE
Module Learning Strategies
The student will be supervised on a one to one basis. Because of the nature of WBL it is not possible to limit the duration of the project to a fixed timescale, but for resourcing purposes the model used will be:-
(1:n)2 for 1 week
(1:1).25 for 12 weeks
This module is intended for work based learners, and the delivery approach will come from the planned integration of work-based skills and academic learning through work-based activities.
Where possible the learning will take place in the workplace, using a combination of work activities, supported by private study, and using underpinning academic input provided by the University.
Where agreed, the University will deliver materials via VLE (e.g. Blackboard), Virtual classroom (e.g. DimDim), telephone conferencing and other appropriate technologies.
There will be no specific requirement for students to attend the University whilst studying this module, but where appropriate, arrangements may be made for face to face meetings, or classroom based delivery.
Module Indicative Content
Introduction to Ethics topics such as:
Defining Ethics
Ethical theories
Relativism
Cultural/ Subject
Divine Command
Kantianism
Principle of Utility
Social Contract Theory
Security and Computer Technology topics such as:
Data Collection principles
Surveillance technology
US Patriot Act
National ID systems
Protecting Privacy
Legal and ethical issues (DPA) (F of I)
Professional Ethics Codes of Conduct and Moral Responsibilities topics such as:
Professional Ethics
Purpose of Professional Codes, BCS
Conflicts of Loyalty
Moral responsibility versus legal liability Statutory Responsabilities topics such as:
HIS Governance
RIPA 2000
Technical Security and Forensics topics such as:
Technical Security - Threats
Technical Security - Controls (Encription, Controls, Anti-virus)
Police processes - Forensic Investigation
Telecoms Issues
Risk Management topics such as:
Risk Evaluation
Risk Mitigation
Operational / Strategic Risk Processes
Policy and Procedure, e.g. CRAM
Module Additional Assessment Details
100% coursework assessing LOs 1 2 and 3.
Recommended word count 3000 or 2000 with presentation
Where possible the assessment will involve a work based project which relates the theoretical aspects of the module to practical applications in the workplace.
Where possible the coursework may involve a presentation of summary findings and recommendations. In which case the weighting recommended would be 70% report and 30% presentation.
Module Texts
Introduction to Computer Law, David Bainbridge, Pearson, 6th Ed, (2007) 0-582 473144
Ethics for the Information Age, Quinn Mike, (2008) 978-0321549365
Gift of Fire, Baase Sara, (2008) 978-013501137-9
Pandora's Box: Social and Professional Issues of the Information Age, Adams Andrew and McCrindle Rachel, 978-0470065532 (2007)
Ethics in IT, George Reynolds, (2007), Thompson, 978-1-4188-3631-3
Ethics and Technology, Herman T. Tavani, Wiley (2007) 0-471-99803-6
Computer Forensics, Warren G.Kruse, Pearson, (2001) 0-201-70719-5