Paper ID #34347Computing Ethics for the Ethics of ComputingDr. Robin K. Hill, University of Wyoming Dr. Hill is an adjunct professor in both the Wyoming Institute for Humanities Research and the Phi- losophy Department of the University of Wyoming, and a Lecturer in Computer Science. She currently writes a blog on the philosophy of computer science for the online Communications of the ACM. Her teaching experience includes logic, computer science, and information systems courses for the University of Wyoming, University of Maryland University College (European Division), State University of New York at Binghamton
Paper ID #28935Exploring Ethical Hacking from Multiple ViewpointsDr. Radana Dvorak, University of Portland Dr. Dvorak received her Ph.D. in computer science from the University of London, Queen Mary College, and Master’s degree in AI from the University of Sussex. Dr. Dvorak has been working in IT, higher education, academic industry and program development for over 25 years. She has served as a researcher, university professor and dean in the US, UK, and the Cayman Islands. Currently, Dr. Dvorak is the Director of the University of Portland Shiley School of Engineering Bachelor of Computer Science Post- Baccalaureate
interest include: STEM Education, Cybersecurity Education, Cybersecurity Policy, Social Engineering, Information Technology Ethics, and Cybersecurity Workforce Development.Dr. Marcus Rogers, Purdue University, West Lafayette Dr. Marcus Rogers, is a Professor and Executive Director of Cybersecurity Programs in the Dept. of Computer & Information Technology, Purdue University. He is the Chief Scientist at the Purdue Tippeca- noe High Tech Crime Unit (HTCU), and the Editor-in-Chief Journal of Digital Forensics Security & Law (JDFSL). Dr. Rogers also sits on the Board of Directors American Academy of Forensic Sciences (AAFS). Dr. Rogers’ research and publications focus on cybercrime, cyber-criminal behavioral
by AI by studying software agents, problem solving bysearching, various ways to represent knowledge, and methods of learning. Additionally, thiscourse will discuss both the ethics and risks associated with the fields of AI. Topics coveredduring the course fall into 4 major categories: (1) Knowledge, Reasoning, Planning, andUncertain Knowledge, (2) Learning and Philosophical Foundations, (3) Communicating,Perceiving, and Acting, and (4) Ethics and Risks. Previously, the authors have used the “flipped”classroom concept in courses. The flipped classroom, when mastered and done well, has beendemonstrated to be beneficial to the students’ ability to learn material [1]. One of the goals forthis project is for students to help create a repository
Science, Technology, Engineering, and Math (STEM)fields, which this paper details. The next section provides more background on OSINT and itsuse by cyber criminals, governments, local law enforcement, and private corporations. Section 3details the OSINT course activity, such as the project description, objectives, classdemographics, logistics and scope, and student deliverables. The fourth section incorporatesstudent responses to the project, including general feelings about the project, how it relates tocybersecurity, strategies for completing the project, and how they managed challenges faced inthe process. Section 5 is an overview of lessons learned by the educator, including how todevelop an ethical project on this topic, create instructions
software, and teaching students how to regularlybackup information to the cloud [6]. At Le Moyne College, an interdisciplinary non-majorscourse was offered titled ‘Cybersecurity for Future Presidents.’ This course, like the one atLoyola, taught students technical skills like encryption, decryption, and packet switching[4].The non-majors courses in cybersecurity that have been designed vary greatly in the style andcontent [6]. Some of the topics covered in these courses are similar to ours: computer networks,cryptography, access controls, threats and human factors, forensics, privacy, ethics, and freespeech, and other computer science fundamentals like, digital representation of information, dataencryption, time complexity, packet switching
student enthusiasm at the end of their internship to enhance the ensuing continuation of their academic experience.A. Introduction Demand for undergraduate Computer Science and Engineering (CSE) education continues to grow,driven by persistent need for professionals with technical skills. In addition to core technical knowledge,students embarking on a career in CSE must be ready to combine theory and practice in a context wherethe underlying technology continually changes, projects are large-scale and collaborative, and professionalresponsibility and ethics-based decision-making are critical when products are adopted widely. Manystudents seek hands-on industry internship experiences to complement their in-class instruction andprepare for these
Paper ID #34894Cross-cultural User Interface Design in a Global Marketplace: BuildingAppreciation for Diversity, Equity, and InclusionMs. Irini Spyridakis, University of Washington Irini Spyridakis is an Assistant Teaching Professor in the Department of Human Centered Design & En- gineering at the University of Washington. Her research and teaching concern ethics and sustainable design in engineering, human computer interaction, smart cities, resource constrained communities, tech- nology for social good, and STEM outreach. She has close to 20 years of teaching experience and is an experienced UX researcher and designer
these processes successfully exceptSACSCOC and we started offering the curriculum courses from 2015.Laboratory ModulesLaboratory modules are used for teaching, research and outreach, and the design of laboratory modulesreflect these uses. We use two different laboratory settings for our cybersecurity concentration courses –virtual and face-to-face.The virtual laboratory is from the NDG NetLAB+(https://www.netdevgroup.com/content/cybersecurity). This platform provides our students withlaboratory experiences on number of cybersecurity and computer science topics in an onlineenvironment. Our students conduct experiments in NISGTC Security+, NISGTC Network Security,NISGTC Forensics, NISGTC Ethical Hacking, CSSIA CompTIA Security+. This laboratory
accredited programs to follow the student outcome criteria.Students in CAC accredited programs must satisfy outcome criteria by having the ability to: 1. Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions; 2. Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline; 3. Communicate effectively in a variety of professional contexts; 4. Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles; 5. Function effectively as a member or leader of a team engaged in activities appropriate to the
spiral, waterfall and agile. (Process) FDBK Demonstrate ability to make improvements after receiving constructive feedback. (Feedback) ETH Demonstrate an understanding of professional ethics appropriate to the use or development of computer science artifacts, and social impact of computer technology. (Ethics) ISPEC Demonstrate an understanding of intellectual property laws and ethics, software licenses, and commensurate rights. Demonstrate an understanding of security, privacy, and other ethical or legal issues, that arise in the context of computing. (Intellectual Property and Security) WRITE Write a clear document which meets the needs of the intended reader(s). (Writing) SPEAK
,devices including development, deployment, security, surpassing 75 billion devices by 2025 [2]. A largeprivacy, and ethics. For every new device, a set of portion of these connected devices is in the categoryprocedures and algorithms need to be developed to of the IoT devices designed to ease people’s dailyenable them to connect, interact, monitor, analyze, lives. With the overwhelming presence of IoT in ourand augment the device’s physical attributes. Given lives, from smart appliances to industrial IoTs, there isthat the data generated and processed by the IoT drastic concern surrounding IoT device securitydevices contain a large amount of private information
project dataBy analyzing the assessment data, it seems students in the senior project have weaknesses inthree major areas: Design, Mathematical modelling, EthicsTo improve design, mathematical modelling, and calculation, suggestion is to have one of themajor weekly assignment be an Engineering Logbook. Every week students should submit theirdesign, and calculation. For example, if students use SONAR in their project, in the engineeringlogbook they must write all calculations and how to measure distance or in the case of motorconnection to micro-controller they must write in the logbook all calculations for the requiredcurrent. Regarding ethics, in the course shell one module should be covered the engineeringethics specially IEEE Engineering
, Ethics: techniques for incorporating ethics in computer curriculum specifically in data science curriculum and programs/curricula: evaluating Data Science programs in the US and China.Dr. Duo Li, Shenyang City University Dr. Duo Li is the chief research scientist of Green Island Hotel Industry Research Institute of Shenyang City University. Duo Li is the member of ASIST&T and his research interests are focusing on Human- Computer-Interaction, Big Data, Data Analytics, Social Networking, and Hospitality Management. QUALIFICATIONS: Skilled professional experienced in big data, data analysis, bibliometric, social net- working sites, statistic software, and online learning system. Full skilled in establishing
program.In broad terms, the recommended curricular content should include: Calculus through Calculus II, Statistics, and discrete mathematics, Laboratory science with University Physics preferred, Technical writing in addition to composition, Macro or microeconomics, Logic and ethics, Public speaking, Programming, Data Structures and Algorithms, Networks, Database, and Cybersecurity and supporting computer science core cores.The final curricular composition was at the discretion of the faculty at the offering institution andhad to satisfy all institutional requirements for admission and graduation.Lower Division CurriculumTh lower-division curriculum was structured with three
ability to apply knowledge of mathematics, science, and engineering(c) an ability to design a system, component, or process to meet desired needs within realisticconstraints such as economic, environmental, social, political, ethical, health and safety,manufacturability, and sustainability(e) an ability to identify, formulate, and solve engineering problems(k) an ability to use the techniques, skills, and modern engineering tools necessary forengineering practice.Assessment results showed that about 60% of students performed at or above expected level ofachievement. Note that the course contains applications of mathematics, science, andengineering. It also includes design and ability to formulate/solve engineering problems. Finallycourse uses
analysis finds,” Press release, November 2, 2018. [Online] Available: https://www.comptia.org/about- us/newsroom/press-releases/2018/11/02/strong-tech-hiring-across-the-u.s.-economy-in- october-comptia-analysis-finds [Accessed January 25, 2019].[7] Software Guild admin, “The Tech Skills Gap,” December 1, 2017. [Online] Available: https://www.thesoftwareguild.com/tech-skills-gap/ [Accessed January 25, 2019].[8] Express Employment Professionals, “Work ethic and attitude trump experience and education; communication is a high priority,” Press release, April 26, 2017. [Online] Available: https://www.expresspros.com/Newsroom/America-Employed/Survey-Results- What-Traits-do-Businesses-Look-for-in-New-Hires.aspx [Accessed January 25, 2019
sufficient cachet that accreditation is not necessary. This may be true; who would not hirea Stanford University graduate simply because the computer science program at Stanford Univer-sity is not accredited by ABET? At the same time, conforming to accreditation standards and peerreview would have helped Stanford or University of Texas avoid headlines that revealed that theircomputer science students have been graduating without taking course work in ethics, somethingABET accreditation standards have required for decades 7 . In contrast, several high-profile andprestigious programs such as MIT are accredited. In this case, presumably, the program or theinstitution has seen value in the accreditation process, or even perhaps to signal to lesser
implementation issues for software systems,including software life cycle, requirements definition and specification, prototyping,verification, validation, testing, fault-tolerance, social and ethical issues of commercialsoftware, and management.A term project is assigned to the students after the 2nd interim exam, which is approximatelyone month before the end of the semester. Each student is requested to design andimplement an image classifier using CNN. The students are expected to use transferlearning to customize pre-trained neural networks for new classes. The new network shouldbe able to distinguish at least two new classes that are not included in the pre-trainednetwork. The students are expected to use TensorFlow as the development tool, because
? software-vulnerabilities-and-why-are-there- so-many-of-them-77930 Summers - Hunting hackers: An ethical https://theconversation.com/hunting-hackers- hacker explains how to track down the bad an-ethical-hacker-explains-how-to-track- guys down-the-bad-guys-70927 Schmidt & White - Why don’t big companies https://theconversation.com/why-dont-big- keep their computer systems up-to-date? companies-keep-their-computer-systems-up- to-date-84250 Shakarian - The Sunburst hack was massive https://theconversation.com/the-sunburst- and devastating – 5 observations from a hack-was-massive
-technical courses required by the eight Chinese computerscience programs. Chinese universities, similar to the U.S. universities, have a general educationrequirement that are common across majors. Usually these requirements do not include coursessuch as calculus or physics, which are considered as technical courses. These non-technicalgeneral education courses can be divided into two categories. One set of courses appear in almostall schools. For example, all our eight sample universities have a PE (Physical education)requirement and an English requirement. Seven of the eight schools require such courses asPrinciples of Marxism, Contemporary Chinese History, Fundamentals of Moral Ethics and Laws,and Military Theory. The second set of non-technical
. Nextwe incorporate sklearn 40 so students can execute and explore the results of machine learningalgorithms. To prepare for machine learning content students watch bots videos 14 and they arealso assigned some ethics reflection prompts in response to Cathy O’Neil’s TED Talk 35 .The common thread across topics is the problem-solving heuristics shown in Figure 1. Weintroduce these early on and revisit them with each topic and explicitly point out when we areusing a strategy, or trying several of them, to solve a problem. For example we point out the useof concrete examples for solving encoding problems, developing algorithms, and initially usinghard-coded values in incremental web development. Another example is how students areexposed to
use cryptography as a security tools, 6) how to implement security defenses such as Security Policy, Vulnerability Assessment, Intrusion Detection, Virus Protection, Auditing, Accounting, and Logging, and 7) how to harden an operating system (Linux or Windows), 8) firewalling, and 9) hands-on experiments using operating system tools used for security. • Information Security: In Fall 2019 and Fall 2020 we reworked the CIS341/CSC341 Information Security course with an emphasize to infuse those aspects of information technology that are directly relevant to network and application layers security and to provide students the opportunity to obtain Security+ certification and/or Certified Ethical
].This C++ program, presented in the appendix, can be a useful assignment to both beginning andadvanced students in engineering and computer science for developing programming skills andalso conveying the historical significance of Lovelace’s work. This interdisciplinary exercisewould promote interdisciplinary competence and knowledge transfer between science andengineering and the humanities, emphasizing the human aspects of the history of science.Lattuca et. al. observed that engineers “need the strong analytical skills fundamental toengineering practice, but also a number of other attributes, such as creativity; skills incommunication, management, and leadership; high ethical standards and professionalism;agility, resilience, and flexibility
. Philip started his academic career as an Associate Professor in the Department of Computer Science at the University of Nebraska at Omaha. He is a member of the American Academy of Forensic Sciences, and holds numerous professional certifications, including Certified Information Systems Security Practi- tioner (CISSP), and a Certified Cyber Forensics Practitioner (CCFP) from (ISC)2, SANS GIAC Computer Forensics Analyst, and an EC-Council Certified Ethical Hacker. His research and teaching interests in- clude sUAS cybersecurity, and general aviation cybersecurity. Dr. Craiger is a certified NAUI technical SCUBA instructor and instructor trainer (certifies NAUI instruc- tors). He has hundreds of technical dives
November 27, 2016. 3. Wikipedia, https://en.wikipedia.org/wiki/Autonomous_robot#History_and_development , accessed on 4/13/2021. 4. Lassa, Todd "The Beginning of the End of Driving". Motor Trend, January 2013. 5. "European Roadmap Smart Systems for Automated Driving", EPoSS, 2015. 6. Lim, Hazel Si Min; Taeihagh, Araz, "Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities". Sustainability, 11 (20): 5791, 2019. 7. Robotics: A Brief History, https://cs.stanford.edu/people/eroberts/courses/soco/projects/1998- 99/robotics/history.html , accessed on 4-17-2021. 8. Gennert, Michael, “Robotics as an Undergraduate Major: 10 Years’ Experience”, Proceedings of
automated car, IEEE/RSJ International Conference on Intelligent Robots and Systems, 1507–1512, 1999. 5. Lassa, Todd "The Beginning of the End of Driving". Motor Trend, January 2013. 6. "European Roadmap Smart Systems for Automated Driving", EPoSS, 2015. 7. Lim, Hazel Si Min; Taeihagh, Araz, "Algorithmic Decision-Making in AVs: Understanding Ethical and Technical Concerns for Smart Cities". Sustainability, 11 (20): 5791, 2019. 8. Fayjie, Abdur, et.al., “Driverless Car: Autonomous Driving Using Deep Reinforcement Learning in Urban Environment”, 2018 15th International Conference on Ubiquitous Robots, 2018. 9. Annual Report on the State of Poverty in Utah, 2014, Community Action Partnership of Utah
topics without in-depth coverage. After taking this course, the students shouldbe able to: • Identify the importance of cyber-physical system security • Understand cryptography and the importance of cryptography in modern society • Develop proficiency using Kali Linux • Learn/demonstrate a PLC ladder logic program • Identify the similarities and differences between IT and OT networks • Understand industrial control system, Shodan, and smart grid • Identify the working of CAN bus • Discuss the ethics of cybersecurity and problems of many hands • Learn/demonstrate penetration test (WiFi, network scan, Nessus, Metasploit, etc) • Understand Risk Assessment and threat modeling • Learn/demonstrate basics of
Associate Professor in the Department of Information and Computer Sciences at Metropolitan State University, and a Senior Fellow at the Leadership Institute (TLI) at the University of Minnesota. Dr. Kaleem is an experienced lifelong cybersecurity practitioner. His research interests include multiple aspects of cybersecurity including Smart Grid Security, Computer, and Network Security but more specifically in the area of mobile device security, mobile malware analysis, and attribution, and mobile forensics. In the past few years, Dr. Kaleem has developed and taught several courses (Ethical Hacking, Digital Forensics Engineering, Mobile Device Forensics, Malware Reverse Engineering, etc.) in the area of cybersecurity
also realized early, that the future data scientists and analysts need to be well-versed in i) public speaking, ii) effective cross-disciplinary and cross-cultural communication,and iii) business ethics. While the initial committee of which we were a part of did not finalizethese aspects of the Data Analytics curriculum, by the time the program had final taken off,appropriate courses (“borrowed”, for example, from the Philosophy Department or theWashington State University’s internationally renowned College of Communication) that coverthese important “non-technical” skills were incorporated into the core requirements of the newBS/BA program – while still keeping the overall credit count manageable (and, in particular,comparable to other 4-year