Switch to: References

Add citations

You must login to add citations.
  1. Ethical awareness of computer use among undergraduate students.Maslin Masrom, Zuraini Ismail & Ramlah Hussein - 2009 - Acm Sigcas Computers and Society 39 (1):27-40.
    This study investigates the ethical awareness of computer use among undergraduate computer science students at two public Malaysian universities. One hundred and fifty-nine students were asked to evaluate the code of ethics pertaining to computer ethics. A comparison of undergraduate computer science students between two public universities was done to determine the level of ethical awareness of computer use. Independent Samples t-tests for differences were performed across four distinct groups: university, gender, age, and duration of computer use. The results of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Revisiting Moor's Towards a Theory of Privacy in the Information Age.Florence Appel - 2010 - Acm Sigcas Computers and Society 40 (2):31-34.
    Back in 1988, when my department chair encouraged me to pursue my interest in developing a course on the social and ethical impact of computing, I was thrilled at the prospect but had no idea how difficult it would be to find resources to support my teaching. I did some pre-Web digging and found two organizations that delivered on their promises to provide me with valuable sources of material: ACM SIGCAS and CPSR. I quickly joined each group, subscribed to each (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Moral pedagogy and practical ethics.Chuck Huff & William Frey - 2005 - Science and Engineering Ethics 11 (3):389-408.
    Online science and engineering ethics (SEE) education can support appropriate goals for SEE and the highly interactive pedagogy that attains those goals. Recent work in moral psychology suggests pedagogical goals for SEE education that are surprisingly similar to goals enunciated by several panels in SEE. Classroom-based interactive study of SEE cases is a suitable method to achieve these goals. Well-designed cases, with appropriate goals and structure can be easily adapted to courses that have online components. It is less clear that (...)
    Download  
     
    Export citation  
     
    Bookmark   23 citations  
  • Reading datasets: Strategies for interpreting the politics of data signification.Lindsay Poirier - 2021 - Big Data and Society 8 (2).
    All datasets emerge from and are enmeshed in power-laden semiotic systems. While emerging data ethics curriculum is supporting data science students in identifying data biases and their consequences, critical attention to the cultural histories and vested interests animating data semantics is needed to elucidate the assumptions and political commitments on which data rest, along with the externalities they produce. In this article, I introduce three modes of reading that can be engaged when studying datasets—a denotative reading, a connotative reading, and (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  • A plea for amateurs.Chuck Huff - 1999 - Acm Sigcas Computers and Society 29 (3):11-12.
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethical attributes in computing and computing education: An exploratory study.Melissa Dark, Nathan Harter, Gram Ludlow & Courtney Falk - 2006 - Journal of Information, Communication and Ethics in Society 4 (2):67-75.
    There is an ongoing concern about workplace ethics. Many voices say that our educational system ought to do something about it, but they do not agree about how to do this. By the time students reach post‐secondary education, they will have already developed a general moral sense. The concern is whether their moral sense is sufficient for ethical situations in the workplace. If not, post‐secondary education is expected to close the gap. In order to do this, educators need information about (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Does computing need to go beyond good and evil impacts?Randy Connolly & Alan Fedoruk - 2015 - Journal of Information, Communication and Ethics in Society 13 (3/4):190-204.
    Purpose– This paper aims to demonstrate that computing social issues courses are often being taught by articulating the social impacts of different computer technologies and then applying moral theories to those impacts. It then argues that that approach has a number of serious drawbacks.Design/methodology/approach– A bibliometric analysis of ETHICOMP papers is carried out. Papers from early in the history of ETHICOMP are compared to recent years, so as to determine if papers are more or less focused on social scientific examinations (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  • The study of database design must address privacy concerns.Florence Appel - 2006 - Journal of Information, Communication and Ethics in Society 4 (3):155-161.
    The proliferation of electronic databases has given rise to many practices and occurrences that pose serious threats to personal privacy. This paper argues that attention to privacy should be an integral part of the database design process, and that database designers are uniquely positioned to ensure that this happens. To motivate students to become privacy‐conscious database design professionals, computer science programs must meet the challenges of implementing an “ethics across the curriculum” methodology to integrate privacy content throughout the design thread (...)
    Download  
     
    Export citation  
     
    Bookmark  
  • Ethics across the computer science curriculum: Privacy modules in an introductory database course.Florence Appel - 2005 - Science and Engineering Ethics 11 (4):635-644.
    This paper describes the author’s experience of infusing an introductory database course with privacy content, and the on-going project entitled Integrating Ethics Into the Database Curriculum, that evolved from that experience. The project, which has received funding from the National Science Foundation, involves the creation of a set of privacy modules that can be implemented systematically by database educators throughout the database design thread of an undergraduate course.
    Download  
     
    Export citation  
     
    Bookmark   1 citation