BIS3999 – Le18(29May2016)

  1. Assignment
    1. no quotation more than 10 words;
    2. refer eletronic workplace surveillance system in general: CCTV, logging, biometric, RFID…
  2. Structure
    1. position of <Vulnerabilities and Limitations> — story telling
      1. First: scope you discussion
      2. Last: state your limit in discussion
    2. Self arguing -> then present scope problem -> and prepare to discuss further
      1. such as game design freedom -> affecting teenagers -> issues of legal age control -> sufficient of legal age control?
  3. Marking Scheme (Self check listing)
    1. Ethical (11)
      1. Ethical issues (3) — issue present Question mark? dual use dilemma?
      2. Perspectives (2)
        1. one issue has two or more perspectives: eg. freedom of speech
        2. yes, it is a problem based on theory / models
      3. Reasoning (2)
        1. because… research results with statistics or  cases
      4. Application (4)
        1. Be an ethical developer / administrator
        2. Two Perspectives and then balanced approach <dilemma.. pdf>
    2. Professional (8)
      1. Perspectives (2)
      2. Reasoning (2)
        1. why we need code of conduct? why guidelines? research results and cases?
        2. example: what is over-monitoring? strict? evidence? less? impact / evidence?
      3. Application (4)
        1. Be a Smart developer / administrator on the topic based on the professional code of conduct;
        2. two Perspectives and then balanced approach <dilemma.. pdf>
    3. Social (6.5) — no application, as it is related to external views
      1. Social issues (2)
      2. Perspectives (2.5)
        1. one issue has two or more perspectives
      3. Reasoning (2)
        1. one perspective has at least one reasoning
    4. Legal (6.5) — no application, as it is related to external views
      1. Legal issues (2.5) – stated regulations / discussing / legal insufficiency / legal disputes /
      2. Perspectives (2)
        1. regulations coverage? enough?
        2. Do public think the regulation is sufficient? different views on regulations?
      3. Reasoning (2)
        1. because… research results with statistics or  case
        2. why enough? case?
  4.  practice
    1. ask why, why, why for each point
    2. 3500 words report writing for practicing critical reasoning;
  5. References
    1. ethical responsibilities of software engineering
Advertisements
BIS3999 – Le18(29May2016)

ITX3000 – Le12 (1May2016)

  1. Contents
    1. Wk13 PPT – Task analysis
    2. Hierarchical Task Analysis
      1. Simple but need practices;
      2. interview user with a specific case to generate a generic flow; then add other options
    3. State Transitions Network
      1. Diagram & Design
      2. Pros & Cons
      3. Limitations
  2. Assignment
    1. CourseWork 2
      1. Home messaging device with calendar (hand design)
        1. research common home activities;
        2. actions required such as notices / appointments / activities;
        3. Four activities
          1. User research – list of activities
          2. Prototyping – drawing
          3. Evaluation
          4. prototype revision
        4. PPT (10 pages) with 40% / per group
        5. Report (<2000 words) / individual
  3. References
  4. Follow-ups
    1. Further studies: Presentation / Writing skills – eg. English
    2. MBA & Business IT of local university in HK
    3. Strategic value: Understand management concerns and directions
    4. Know others’ needs of human resources;
    5. IT directions by SWOT;
    6. Direction: business level / views / workflows & system with procedures -> 國內和國際接軌;
      1. (5 years to) Experts level in specific vertical fields after SWOT analysis for future needs;
      2. World financial hub in London;
      3. Problem solving – high salary;
    7. Project manager: No delay, No extra works, No extra cost, No perfect;
ITX3000 – Le12 (1May2016)

BIS3400 – Le12 (24April 2016)

  1. Content
    1. Big Data & Digital Divide PPT;
    2. analyze and visual data, eg. CCTV;
      1. additional data for marketing;
      2. for projection / prediction functionalities;
    3. Big data characterized by 5V:
      1. Volume: large quantity; scales of exabytes
      2. Velocity: rapid production and processing needs
      3. Variety (mostly unstructured):
      4. Veracity (low quality input with high quality output requirements):
      5. Value:
    4. *Kant VS Consequentialism: (Ethic and Social: high mark differentiation)
      1. Kant: Belief & Principles (Common to all / not based on situation)
        1. Rules / orders -> quick decision logics
        2. Timeline: Long term
        3. sample -> Internet Content Regulation -> Freedom of Speech (Democracy) -> Western
        4. Culture: ocean culture – multi ethnics; western: intra-continental – single-ethnic stability;
      2. Consequentialism: Base on Situations / Result & Benefits & Cost
        1. Timeline: NOW; does the result gives us a better result now?
    5. Example: Internet content regulation
      1. K: Freedom of Speech -> Democracy
      2. C: Can “Social Order” Principle out-balance the “freedom of speech””
  2. Assignment
    1. Firstly, by Principle of Kant – working surveillance is not ethical
      1. what IT can do
      2. not ethical for electronic surveillance
    2. On the other hand of Consequentialism
      1. IT can bring advantages: minize
      2. in view of consequentialism -> ethic for electronic surveillance
    3. Refer to structures of PPT in Big Data
      1. Legal (P.16 of PPT of Big Data)
        1. existing laws (300 words)
        2. drafting laws with disputes (400 words)
      2. Definitions of “Electronic workplace surveillance” with quote
        1. quotation
        2. define scope
      3. Social theories: such as discrimination…
  3. Follow-ups
    1. 中簽率
    2. Sales related indicators for decision / improvements;
    3. Data protection policies; with monthly reports for storage and comparison;
    4. don’t always quote in law and professional (use your own wordings to state in legal and professional)
      1. re-phrasing in laws
    5. Social media: ethical to crawl data from social media account? samples / scenarios
    6. Next lesson – two PPT slides of ethical issues
      1. with notes
      2. 10 PPT
        1. definition – 1
        2. ethic – 2
        3. soical – 2
        4. legal – 2
        5. professional – 2
        6. vulnerabilities and limitations – 1
  4. References
    1. Analytic functions with IP cam;
    2. Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, Ohm, Paul — about
    3. Benson’s Writing approach in Marking scheme
      1. Main bodies -> Conclusion -> Introduction
      2. Ethical -> Social -> Legal -> Professional
        1. Two PPT slides of ethical
BIS3400 – Le12 (24April 2016)

BIS3400 – Self research Materials

Ethical

Social:

  1. cyberloafing / cyberslacking
  2. How companies assist staff need help without intrude their privacy / private life?

Legal

Professional

  1. Unfogetting Internet

Vulnerabilities and Limitations

Keywords searching

  1. securing workplace information deontological

References:

  1. Medical privacy rules let Germanwings co-pilot conceal illness: http://www.bloomberg.com/news/articles/2015-03-29/medical-privacy-rules-let-germanwings-co-pilot-conceal-illness
  2. Mental Health in Workplaces: Employee’s privacy and Employer’s right to know: http://www.insurancejournal.com/news/national/2015/04/02/362478.htm
  3. Disclosure of Germanwings Co-pilot’s Medical Information Raises Tricky Privacy Concerns: http://www.privsecblog.com/2015/04/articles/healthcare/disclosure-of-germanwings-co-pilots-medical-information-raises-tricky-privacy-concerns/
  4. Technologies to identify threats from employees: http://haystax.com/

 

BIS3400 – Self research Materials

Le10 – BIS3400 (10Apr2016)

  1. Content
    1. PPT1 – WK11 Internet Content Regulation:
      1. Related to topics of Workplace electronic monitoring / ISP content monitoring;
      2. Tradition content publishing (mechanism / country-border) vs Internet content publishing
      3. Writing idea: How technology drive change for an issue…commercial activities / problems emerge after technology evolves;
      4. Digital footprints tracing or block by browser level;
        1. Technology of <dark web>: peer to peer based; could not search by search engines; such as anti-governmental activities;
      5. Why internet highly available? powerful host / many-to-many possible routes (usually not planned)? some regions / countries do not have similar content regulation.
      6. Political consequences of denying free expressing: silencing of dissent and opposition; censorship
      7. Right of freedom expression (Kant)
      8. Exceptions to the right of the freedom of expression (Consequentialism)
        1. protection of the reputation of others;
    2. PP2 – WK19 Games
      1. Embedded values, such as racial sterotyping, violence…
      2. analyze its rules of a game before describeing the ethical issues of a computer game: what the player could choose / is forced and encouraged to do;
      3. UDHR vs discrimination of races / religions in games;
  2. Assignment
    1. Quotes from Act, need Act & Section,
    2. Monitoring access / monitoring content?
    3. Professional: compliance with law such as Acts…
      1. Key questions to professional – slide 16 of PPT – assignment writing;
    4. Legal case against IT professionals of recording / monitoring / violating laws?
    5. legal case about discrimination / data mis-use / abuse of surveilance?
    6. PowerPoint (must have)
      1. Notes
      2. Citations and references list in PowerPoint
    7. header with name/title/student no., right bottom with page number
    8. highlight of ethical issues in your topics with principles, references, cases and applications…
    9. Ethical issue: morally right or wrong
      1. Social: impacts of the ethical issue
    10. Quotes from Code of conduct; discussion about materials enough of not, include discussing topics or rules;
  3. Keywords:
    1. Anonymising, dark web, Telegram, censorship, defamation (written / civil), libel (proven loss), hatred, dilemmas, avatars,
  4. References
  5. Follow-ups
Le10 – BIS3400 (10Apr2016)

Le9 – BIS3400 (3 April 2016)

  1. Assignment 2 at 22May (No turnitin) (25%)
    • Time: 7-10 minutes
    • 8 slides
    • 4 topics, thus 2 slides / topic
    • Contents in point form with Visual aids
    • Detailed explanations and references and notes in footnotes
    • Search figures in CC
  2. Contents
    • Arguments in slides: ethical and social issues
    • IP: ideas be privately owned? Common contribution
    • Government sponsoring research but have no ownership of the results
    • <Fair Use> of IP: legal issues about conditional / exceptional use of IP; for example, 10% of original publications;
    • Common code: variations of IP;
    • Other issues: Copyleft / Reverse engineering (not ethical?); code sharing on web -> self-owned product;
    • Professionalism: falsely declared the copycat as owned IP, eg. Reusing resources needs declaration of GNU;
    • Open source licensing: GNU with self-owned IP: Fedora and Red Hat Enterprise Linux;
  3. Assignment
    • Reviews slides of security to retrieve ideas of ethical and social
    • General cases
    • Arguable cases study in specific;
    • Referring to discussion PPT of IP
  4. Presentation
    • Intro and background
    • Ethical: natural laws vs consequentialism
    • Legal: rules
    • Social: point form
    • Professional: privacy related rules instead of introducing body
    • Common mistake -> no identify rules / points
  5. Follow-ups
    • Security PPT
    • MDX ppt template
    • 3 topics with supporting documents
    • TOC of strategic management
    • Academic reference from Benson and Alan
    • Setup and demo theme to Benson next lesson
    • Scripts and prototype deliverable functions details to Benson
    • 2 hours – review group project and summary findings / others
Le9 – BIS3400 (3 April 2016)

BIS3400 – self works

Keywords:

  1. employer social media monitoring
  2. Code of ethics. https://www.isc2.org/uploadedfiles/(isc)2_public_content/code_of_ethics/isc2-code-of-ethics.pdf
  3. http://www.isaca.org/certification/code-of-professional-ethics/pages/default.aspx
  4. Is privacy to blame for the Germanwings tragedy? http://blog.practicalethics.ox.ac.uk/2015/04/is-privacy-to-blame-for-the-germanwings-tragedy/
  5. EPM (electronic performance monitoring)
  6. CPM (computer performance monitoring)
BIS3400 – self works