CS20-CS2
Investigate the impacts of information technologies on privacy, including digital security practices.
Indicators for this outcome
(a)

Describe legal and ethical issues related to the use of computing devices (e.g., social media, advertising, encryption, malicious software and social engineering).

(b)

Explore how issues related to personal rights and privacy such as identity theft, data collection, permanence of information on the Internet and surveillance are affected by technologies.

(c)

Identify the role of different layers (e.g., network, operating system, application and data) of digital security, including the responsibility of users.

(d)

Discuss the benefits and limitations of user authentication techniques to prevent or allow access to resources

(e)

Research data encryption techniques used for storage and transmission.

(f)

Explore the role of personal responsibility in the context of access and use of confidential information, including intellectual property rights and plagiarism.

Loading...
R014943
Computer Science Illuminated (7th ed.)
This is an introductory computer science textbook which is not tied to any coding language. The book is divided into chapter sections on the history of computing, number systems, hardware, programming, operating systems, applications, and communications and include exercises and ethical issues at the end of each chapter. Special features include 16 biographies (3 of women), 18 ethical issues and numerous informative side panels.
Media and Formats : Book
Price : See publisher.
Record posted/updated: June 1, 2022