This module aim to critically explore the relationship between information technology and society and to prepare you to participate actively in ethical vocationally-related deployment of information technologies
Aims and Objectives
Knowledge and Understanding
Having successfully completed this module, you will be able to demonstrate knowledge and understanding of:
- Debate critically a variety of viewpoints surrounding technology and society
- Identify the key ethical and legal issues in Information Technology for Society
- Demonstrate familiarity with key international issues such as privacy and information rights
- Describe the relationship between information technology and society
- Describe legal concerns relevant to an IT Manager
- Justify, and use a cohesive code of Professional Practice pertaining to information systems
Management Issues in IT:
- Contractual restraints
- Compromises in systems planning
- Constraints of a legal nature
- Professional Issues in IT
- Career structures
- Codes of conduct and practice
- Contractual obligations in software
Legal Issues in IT:
- Copyright and patent
- Trade secrets and registered design
- Computer generated evidence
- Obscene publications
The module will analyse technology dependency in social, organisational and global contexts through time. You will explore the relationship between information technology and technologies in general. You will also explore the uniqueness of information technology.
Case studies in key areas of current interest will be presented covering the broad themes of:
- Knowledge: technology's effect on the storage, transmission, recording and dissemination/communication of knowledge, digital news-media, distance learning and education, the knowledge economy
- Information: definitions of information and data, relationships to people, data capture, storage and retrieval, biometrics and individual identity
- Society: global societal issues such as privacy rights, internet-related legislation, public and private knowledge and information, electronic/on-line voting and civil liberty.
The above examples are included for illustrative purposes and will vary from year to year. The unit will extrapolate the trends studied and speculate on the future of technology in everyday life and work.
Learning and Teaching
|Completion of assessment task||56|
|Preparation for scheduled sessions||18|
|Wider reading or practice||22|
|Total study time||150|
Resources & Reading list
Schneier, B. (2004). Secrets and Lies: Digital Security in a Networked World. Wiley.
Ben Shneiderman (2003). Leonardo's Laptop. MIT Press.
Bott, F. (2005). Professional Issues in Information Technology. Swindon: British Computer Society.
Herman T Tevani (2004). Ethics and Technology. Wiley.
Gollman, D. (2011). Computer Security. Wiley.
This is how we’ll formally assess what you have learned in this module.
This is how we’ll assess you if you don’t meet the criteria to pass this module.
An internal repeat is where you take all of your modules again, including any you passed. An external repeat is where you only re-take the modules you failed.
Repeat type: Internal & External