CPSC 3610

Ethical and Social Issues in Computing (Non-IA course)

Course Description

This course examines the ethical and social issues arising from advances in computer technology and the responsibility that computer professionals and users have with regard to computer use by focusing on the intrinsic link between ethics and the law, how both try to define the validity of human actions, and on the moral and ethical dilemmas created by computer technology that challenge the traditional ethical and moral concepts. Prerequisites: ENGL 1020 and CPSC 1000 or 1100 with minimum grades of C or department head approval. Supplementary course fee assessed.


Ethical and Social Issues in the Information Age, 3rd edition, Joseph Kizza, ISBN: 978-1-84628-658-2

Lecture Notes





  • Schulze, K. G., & Grodzinsky, F. S. (January 01, 1997). Teaching Ethical and Social Issues in CS1 and CS2. Sigcse Bulletin, 29, 1, 6.
  • A gift of fire: social, legal, and ethical issues in computing. (October 01, 1997). Choice Reviews Online, 35, 2, 35-950.
  • Tavani, H. T. (January 01, 2002). Applying an interdisciplinary approach to teaching computer ethics.(Special Issue: ISTAS '01: Ethical and Social Issues Criteria in Academic Accreditation)(International Symposium on Technology and Society). Ieee Technology and Society Magazine, 21, 3, 32-38.
  • Magenheim, J., & Schulte, C. (January 01, 2006). Social, ethical and technical issues in informatics--An integrated approach. Education and Information Technologies, 11, 3-4.  


  • IGI Global., & Information Resources Management Association. (2003). Journal of electronic commerce in organizations. Hershey, Pa: IGI Global (701 E. Chocolate Avenue, Hershey, Pa., 17033, USA. 


  • Kizza, J. M. (2013). Ethical and social issues in the information age. London: Springer London.
  • Donaldson, T., & Werhane, P. H. (1983). Ethical issues in business: A philosophical approach. Englewood Cliffs, N.J: Prentice-Hall.
  • Gay, G., & Bennington, T. L. (1999). Information technologies in evaluation: Social, moral, epistemological, and practical implications. San Francisco, Calif: Jossey-Bass. 


Secure Use

General Security Policy: Cyber Ethics

Cyber Ethics 

General Security Policy: Information Technology Security Evaluation Criteria (ITSEC)

ITSEC Definition 

General Procedures: Inference

Inference Definition 

General Procedures: Rainbow Series

Rainbow Series 

General Procedures: NSTISSAM COMPUSEC/1-99 Insider Threat to Government Computer Systems

NSTISS Glossary 

General Countermeasures and Safeguards: Computer Law

Computer Law 

General Countermeasures and Safeguards: Computer Media

Computer Media 

General Countermeasures and Safeguards: Evaluate Security Testing Tools

Security Testing Tools 

Administrative Countermeasures/Safeguards: Control Management

Change Control 
Control Management 

Administrative Countermeasures/Safeguards: Privacy Act

Privacy Act of 1974 

Operations Policies/Procedures: Keystroke Monitoring

Keystroke Monitoring 

Operations Policies/Procedures: Disaster Recovery Planning

Disaster Recovery 


Policy and Procedures: Incident Response

Incident Response 

Policy and Procedures: Witness Interrogation

Witness Interrogation 

Operations Countermeasures/Safeguard: Computer Attacks

Computer Attacks 
Computer Virus Timeline 

Operations Countermeasures/Safeguard: Computer Emergency Readiness Teams



Administrative Policies/Procedures: Approval to Operate

Approval to Operate 

Administrative Policies/Procedures: Configuration/Change Control

Change Control 

Administrative Policies/Procedures: Copyright Protection

Copyright Protection 

Administrative Policies/Procedures: Patch Management

Patch Management 

Administrative Policies/Procedures: Records Management

Records Management

Administrative Policies/Procedures: Wireless Use Policies

Wireless Use Policy 

Anomalies and Integrity

General Risk Management: Computer System Risk Management

Risk Management 

Access Control Safeguards: Computer System Access Control

Access Control 

Access Control Safeguards: Protected Distribution Systems

Protected Distribution System 

Access Control Safeguards: Information Systems Access Restrictions

Access Restrictions 


Access Control Mechanisms: KMI Applications

Key Management 

Access Control Mechanisms: Single Sign-on

Single Sign On 

IA Sites