Teaching Considerations
A. Suggested Schedule:
The following sample module plan is based on the offering of three to six hours of lectures.
Ethics |
0.2 to.5 hour |
Computer Room Environment |
0.2 to.5 hour |
Physical Security |
0.2 to.5 hour |
Data Security |
0.5 to 1 hour |
Security Training |
0.1to0.2 hour |
B. Homework and Lab Exercises
Following are examples of Class /Lab/ Paper exercises to enhance the lecture material for the module.
- Visit the microcomputer facility. Interview users and staff, asking their opinions about the ethical considerations discussed in class.
- Examine the computer laboratory, identifying potential problems with physical security.
- Design a security backup procedure for a personal computer/ workstation.
- Recover a ‘lost’ file/program from a disk.
Bibliography
- Johnson, Douglas W., Computer Ethics: A Guide for the New Age, The Brethren Press, 1984.
- This low-cost, readable paperback book introduces critical issues, including: personal data, decision-making and identifying, building and maintaining ethics in a computer society. This book addresses the question of ethics in the indiscriminate use of the personal computer. The concept of what ethics are is proposed and suggestions are made for establishing a code for personal computer use.
- Department of Defense, “Personal Computer Security Considerations,” NCSC-WA-002-85, Dec. 1985
- This publication provides a general discussion of some issues pertinent to microcomputer security in the home and business environment.
- DATAPRO Research Corp., “Data Pro Reports on Information Security”, 1988
- This is a collection of reports dealing with all aspect of information security. Reports IS30-xxx-xxx are primarily concerned with the subject of microcomputer security.
- DATAPRO Research Corp.
- Delran, NJ 08075 (800) 328-2776
- Richards, T., Schou, C.D. & Fites, P.E. “Information Systems Security Laws and Legislation,” in Information Security Modules, Department of Defense, 1989.
- Richards, et. al. review topics, timely laws and legislation about computer security as it relates to the individual and the organization.
The materials on these pages are Copyright by the respective authors. The materials may be used for non-commercial academic purposes. Please cite the original author and source where appropriate.