Teaching Considerations

Suggested Schedule:

The following sample module plan is based on the offering of three to six hours of lectures.

  1. Ethics.................................................... 0.2 to.5 hour

  2. Computer Room Environment....................... 0.2 to.5 hour

  3. Physical Security...................................... 0.2 to.5 hour

  4. Data Security........................................... 0.5 to 1 hour

  5. Security Training....................................... 0.1to0.2 hour

B. Homework and Lab Exercises

Following are examples of Class /Lab/ Paper exercises to enhance the lecture material for the module.

  • Visit the microcomputer facility. Interview users and staff, asking their opinions about the ethical considerations dis­cussed in class.

  • Examine the computer laboratory, identifying potential problems with physical security.

  • Design a security backup procedure for a personal computer/ workstation.

  • Recover a ‘lost’ file/program from a disk.

Bibliography

Johnson, Douglas W., Computer Ethics: A Guide for the New Age, The Brethren Press, 1984.

This low-cost, readable paperback book introduces critical issues, including: personal data, decision-making and identi­fy­ing, building and maintaining ethics in a computer society. This book addresses the question of ethics in the indiscrimi­nate use of the personal computer. The concept of what ethics are is proposed and suggestions are made for establishing a code for personal computer use.

Department of Defense, “Personal Computer Security Considerations,” NCSC-WA-002-85, Dec. 1985

This publication provides a general discussion of some issues pertinent to microcomputer security in the home and busi­ness environment.

DATAPRO Research Corp., “Data Pro Reports on Information Security”, 1988

This is a collection of reports dealing with all aspect of information security. Reports IS30-xxx-xxx are primarily con­cerned with the subject of microcomputer security.

DATAPRO Research Corp.

Delran, NJ 08075 (800) 328-2776

Richards, T., Schou, C.D. & Fites, P.E. “Information Systems Security Laws and Legislation,” in Information Security Modules, Department of Defense, 1989.

Richards, et. al. review topics, timely laws and legislation about computer security as it relates to the individual and the organization.